(71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(72),  an ap

admin2009-02-15  31

问题 (71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(72),  an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.Networks that use(73) to secure data traffic can automatically authenticate devices by using(74), which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require(75) connections among many devices.

选项 A、IPSec
B、SSL
C、L2TP
D、The Internet Key Exchange

答案D

解析
转载请注明原文地址:https://kaotiyun.com/show/EJtZ777K
0

相关试题推荐
最新回复(0)