MCQOPTIONS
Bookmark
Saved Bookmarks
→
Network Security
→
Networking Overview I
→
How many trust models does the RFC 4251 dictate?
1.
How many trust models does the RFC 4251 dictate?
A.
2
B.
3
C.
4
D.
5
Answer» B. 3
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
The protocol ‘POP’ stands for-a) Personal Office Protocolb) Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?
In the Key generation procedure, the Initialization Vector from the server to client is represented as:
The session Identifier remains constant throughout the SSH connection.
What is the recommended MAC algorithm for the SSH Transport Layer?
What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?
The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –
Which of the following is not a secure shell protocol?a) Transport Layer Protocolb) Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?
WHAT_IS_THE_RECOMMENDED_MODES_OF_OPERATION_FOR_ENCRYPTION_AND_DECRYPTION_IN_THE_SECURE_SHELL_TRANSPORT_LAYER??$
The session Identifier remains constant throughout the SSH connection.$
What_is_the_recommended_MAC_algorithm_for_the_SSH_Transport_Layer?$
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies