Which of the following protocols can guarantee the confidentiality of data transmission? (Multiple Choice)
Correct Answer:
BD
Which of the following is wrong about the management of Internet users?
Correct Answer:
B
Digital signature is to achieve the integrity of data transmission by using a hash algorithm to generate digital fingerprints.
Correct Answer:
A
Which of the following is the port number used by L2TP packets?
Correct Answer:
C
Which of the following option does not belong to symmetric encryption algorithm?
Correct Answer:
D