- 积分
- 68
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
发表于 2018-1-24 10:59:13
|
显示全部楼层
VCE 题库里有个问题,请教一下
% U4 n: W' H* j2 M0 ?4 }QUESTION 79
+ ^4 H5 y) A# a; i( `) Q3 eWhich two characteristics of DTLS are true? (Choose two)3 N+ m7 g0 I4 j1 \" m+ _
A. It supports long data transfers and connectionless data transfers.* w3 J6 l! v V1 L9 d
B. It includes a retransmission method because it uses an unreliable datagram transport.+ W' M: A+ f0 s* c" C- h8 p7 o
C. It includes a congestion control mechanism.
5 Y \. I' S3 Y5 f! ED. It is used mostly by applications that use application layer object-security protocols.
( b/ i% Z: e$ M Z+ V% ?" C! NE. It completes key negotiation and bulk data transfer over a single channel.1 t3 j9 J7 [" H6 n
F. It cannot be used if NAT exists along the path.
& D- G% ~, j X! r# |0 r$ L9 c答案B E2 G, K& t' Y l% L
% {7 K% U/ ]$ S! @
4 A+ k9 A: \6 E J9 PQUESTION 143/ l. `7 F, Z* u9 E9 R& L( w( I* o
Which two characteristics of DTLS are true?(Choose two)
) |% k7 C9 `, z# s& ]A. It is used mostly by applications that use application layer object-protocols) ?3 T& E9 o6 T/ J' R
B. It includes a congestion control mechanism! o* h5 l W. |9 R, W$ O/ n& E. f8 ~
C. It completes key negotiation and bulk data transfer over a single channel.
e+ ]6 m" z% Z1 `D. It supports long data transfers and connectionless data transfers.& L, k/ C/ b2 J
E. It cannot be used if NAT exists along the path.
% N# w5 N+ s/ cF. It concludes a retransmission method because it uses an unreliable datagram transport.
( l( z/ n- V4 b' J答案:BF$ u4 F# s6 C9 @6 y6 Z' l5 a% o; p
2 |! }+ H C; J6 M2 w
4 D0 n2 f0 u1 L; i9 Z所以应该哪个是对的啊
! ]) j' r/ V0 i* k$ w, F |
9#
2018-1-24 10:59:13
回复(0)
收起回复
|