单项选择题
What is the MD5 algorithm used for?()
A.takes a fixed-length message and produces a 128-bit message digest
B.takes a variable-length message and produces a 168-bit message digest
C.takes a message less than 2^64 bits as input and produces a 160-bit message digest
D.takes a variable-length message and produces a 128-bit message digest ActualTests.com
相关考题
-
单项选择题
WhichstatementbestdescribesconfiguringaccesscontrolliststocontrolTelnettrafficdestinedtotherouteritself?()
A.The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
B.The ACL is applied to the Telnet port with the ip access-group command.
C.The ACL must be applied to each vty line individually.
D.The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port. -
单项选择题
Whichfeatureisapotentialsecurityweaknessofatraditionalstatefulfirewall?()
A.It cannot support UDP flows.
B.It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.
C.It cannot detect application-layer attacks.
D.The status of TCP sessions is retained in the state table after the sessions terminate. -
单项选择题
WhichstatementbestdescribesCiscoIOSZone-BasedPolicyFirewall?()
A.A router interface can belong to multiple zones.
B.Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
C.The pass action works in only one direction
D.A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
