- 积分
- 68
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
8 l- |( w1 K3 s! y; G0 u" R3 B; d# F0 @4 C
400-251 VCE 题库里有个问题,请教一下
' ` v% |1 E: v$ B$ hQUESTION 79
3 w' z) K) Y6 X6 ]) E& [Which two characteristics of DTLS are true? (Choose two)
9 j6 a% B5 |" jA. It supports long data transfers and connectionless data transfers.; M M2 s1 \% U7 T* z! n# T
B. It includes a retransmission method because it uses an unreliable datagram transport.
8 h- h) ?1 F: a( X, W# c. G9 BC. It includes a congestion control mechanism.
( `; z' r) d! C; T$ x% R+ r$ qD. It is used mostly by applications that use application layer object-security protocols.
$ d' N" W6 v" K2 X; V; dE. It completes key negotiation and bulk data transfer over a single channel.0 a0 N: u9 h& Z6 z* t
F. It cannot be used if NAT exists along the path.5 U$ R6 H* P; |/ O+ ^; q2 v9 X
答案B E9 |1 e5 ^+ `. e) [8 _: F7 V7 H
6 r4 p" E4 [, N3 B8 U( N" u' k) H" D" \& F
QUESTION 143
! ]( V% V% ^) I8 D4 v, b5 [Which two characteristics of DTLS are true?(Choose two)- r* W. U8 E9 k+ _' @3 N
A. It is used mostly by applications that use application layer object-protocols
7 A7 h0 r( @# Z. ?# G" z% L b2 y/ dB. It includes a congestion control mechanism9 r" j, Z3 D9 O9 Y7 M |4 D; `
C. It completes key negotiation and bulk data transfer over a single channel. b3 |0 U( Y( x3 U
D. It supports long data transfers and connectionless data transfers.. V6 r+ X! s* y# h: d
E. It cannot be used if NAT exists along the path.; f$ @2 V1 \$ L1 d' l, e
F. It concludes a retransmission method because it uses an unreliable datagram transport.2 ^& E2 b3 n/ Z# ~# X; a
答案:BF
- v; v; Y! M* u# i8 j T2 i( b7 C9 O a0 T
. V+ g( f N2 l# Q所以应该哪个是对的啊 |
|