单项选择题
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
A. A session key value is exchanged across the network.
B. A session key never passes across the network.
C. A session key is used as the key for asymmetric data encryption.
D. A session key is used as the key for symmetric data encryption.
相关考题
-
多项选择题
Which two statements about the use of SCREEN options are correct? ()(Choose two.)
A. SCREEN options offer protection against various attacks
B. SCREEN options are deployed prior to route and policy processing in first path packet processing
C. SCREEN options are deployed at the ingress and egress sides of a packet flow
D. SCREEN options, you must take special care to protect OSPF
-
多项选择题
Which two statements about static NAT are true? ()(Choose two.)
A. Static NAT can only be used with destination NAT.
B. Static NAT rules take precedence over overlapping dynamic NAT rules.
C. NAT rules take precedence over overlapping static NAT rules.
D. A reverse mapping is automatically created. -
单项选择题
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
A. set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam
B. set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam
C. set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy
D. set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam
