单项选择题
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
A. the business knowledge of the IT staff
B. the technical knowledge of the IT staff
C. the company’s business objectives
D. the company’s network topology
E. the IT future directions
点击查看答案
相关考题
-
单项选择题
WhichIOSQoSmechanismisusedstrictly toratelimittrafficdestinedtotherouteritself?()
A. Class-Based Policing
B. Control Plane Policing
C. Dual-Rate Policier
D. Single-Rate Policier
E. Class-BasedTraffic Shaper -
单项选择题
InanL2TPvoluntarytunnelingscenario,theVPDNtunnelisterminatedbetween:()
A. The client and the NAS.
B. The NAS andthe LNS.
C. The NAS and the LAC.
D. The client and the LNS. -
单项选择题
WhichoneofthefollowingisNOT asupportedIKEattribute?()
A. PFS group.
B. Encryption algorithm.
C. Hashing Algorithm.
D. Authenticationmethod.
E. Lifetime duration.
