答案:1:A,2:C,3:B,4:C,5D
第9套 _(1)__ is used to ensure the confidentiality,integrity and authenticity of the two end points in the private etwork .the__(2) __,an application layer protocol,authenticates each peer in an IPsec transaction ,IKE negotiates security policy,determining which algorithm may be used to set up the Runnel .It also handles the exchang of session keys used for that one transaction.Networks that use __(3)__to secure data traffic can automatically authenticate devices by using __(4)__,which Verify the identities of the two users who are sending information back and forth .IPsec can be ideal way to secure data in large networks that require __(5)__ connections among many devices。 (1) A.Encryption B.Code C.Certificate D. Tunnel (2) A.associated links B.Internet Key Exchange C IPsec D. encryption (3) A authenticity B.password C.IPsec D. Internet Key Exchange (4) A.protocols B.keywords C.IKE D. digital certificates (5) A.free B.strict C.secure D.remote 答案:1:A,2:B,3:C,4D,5:C
第10套Bluetooth is a universal radio interface in the __(1)__frequency band that enables portable electronic devices __(2)__ connect and communicate __(3)__via short range,ad hoc net Works .Each unit can simultaneously communicate with up to__(4)__ other units per piconet.Moreover,each unit can simultaneously __(5) __to several piconets,Bluetooth technology which apart from Ericsson,has gained th support of Nokia,IBM,Toshiba,Intel and many other manufactures,eliminates ths need for wires,cables and connectors for and between cordless or mobile phones,modems,headsets,PDAs,Computers,printers.projectors,local area networks,and so on ,and paves the way for new and completely different devices and applications。 (1) A.2.45GHZ B. 4.45GHZ C. 2.95GHZ D. 1.45GHZ (2) A.in B.on C.to D. with (3) A.narrowly B.wirelessly C.freely D.widely (4) A.use B.sever C.host D. base (5) A.relate B.add C.close D. belong 答案:1:A,2:C,3:B,4:B,5D
|