(1) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network .The (2) ,an application layer protocol, authenticates each peer in an IPsec transaction, IKE negotiates security policy, determining which algorithm may be used to set up the tunnel .It also handles the exchange of session keys used for that one transaction. Networks that using (3) to secure data traffic can automatically authenticate devices by using (4) which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require (5) connections among many devices。
(1) A.Encryption B.Code C.Certificate D. Tunnel
(2) A.associated links B.Internet Key Exchange C IPsec D. encryption
(3) A authenticity B.password C.IPsec D. Internet Key Exchange
(4) A.protocols B.keywords C.IKE D. digital certificates
(***.free B.strict C.secure D.remote #p#
答案: 1、A 2、B 3、C 4、D 5、C
参考译文:
加密技术是用来确保一个私网中两端传送数据的机密性、完整性和真实性。而IKE协议,是一种应用层的协议,是用来在一次IPsec交换数据中验证对端的协议。它通过协商安全协议来决定在管道(tunnel)中建立的算法。IKE同时也能处理一次会话中的安全会话密钥。网络中使用IPsec来保护数据,它通过IKE来验证来回的数据。IPsec是一种在大型网络中保护数据的一种理想方法,它需要在多种设备间通信的安全性。
【相关内容】