Which two statements are correct regarding the AES encryption algorithm?
Which two statements are correct regarding the AES encryption algorithm? (Choose two.)
What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec VPNs?
What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec
VPNs? (Choose two.)
which security limitation of DNS?
DNSSEC was designed to overcome which security limitation of DNS?
Which three statements are true about MACsec?
Which three statements are true about MACsec? (Choose three.)
which three options?
IPsec SAs can be applied as a security mechanism for which three options? (Choose three.)
Which SSL protocol takes an application message to be transmitted, fragments the data into manageable blocks
Which SSL protocol takes an application message to be transmitted, fragments the data into
manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and
transmits the resulting unit in a TCP segment?
Which four options are valid EAP mechanisms to be used with WPA2?
Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)
Which three statements are true about the SSH protocol?
Which three statements are true about the SSH protocol? (Choose three.)
Which two statements are true when comparing ESMTP and SMTP?
Which two statements are true when comparing ESMTP and SMTP? (Choose two.)
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?