Question 276
Regarding GRE encapsulation and decapsulation, which of the following descriptions is wrong?
Question 277
Regarding the order of the PKI work process, which of the following is correct?
1. The communication terminal applies for the CA certificate
2. PKI reply to CA certificate
3. Obtain each other's certificates and verify the validity
4. Install the local certificate on the communication end
5. PKI issues local certificates
6. The correspondent applies for a local certificate
7. Install the CA certificate on the communication end
8. Communicate with each other
1. The communication terminal applies for the CA certificate
2. PKI reply to CA certificate
3. Obtain each other's certificates and verify the validity
4. Install the local certificate on the communication end
5. PKI issues local certificates
6. The correspondent applies for a local certificate
7. Install the CA certificate on the communication end
8. Communicate with each other
Question 278
As shown in the following, there are two Server Map entries generated after the NAT Server is configured. Regarding the information presented in the figure, which of the following descriptions is wrong?
Type: Nat Server, ANY -> 1.1.1.1 [192.168.1.1]
Type: Nat Server Reverse, 192.168.1.1 [1.1.1.1] -> ANY
Type: Nat Server, ANY -> 1.1.1.1 [192.168.1.1]
Type: Nat Server Reverse, 192.168.1.1 [1.1.1.1] -> ANY
Question 279
The key used by DES encryption is bits, while the key used by 3DES encryption is bits.
Question 280
The leakage of personal information belongs to the destruction of the ________ characteristics of the information.