- 积分
- 68
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
/ n s: K5 T. W/ ~0 @400-251 VCE 题库里有个问题,请教一下; d7 g, i8 ?' _$ M" U- r
QUESTION 79
8 |4 `6 W1 t; G( r8 l/ XWhich two characteristics of DTLS are true? (Choose two), A5 H& R5 j1 O$ D6 k! r, z9 Z6 e/ |5 I
A. It supports long data transfers and connectionless data transfers.
# p* c! ]6 z0 _1 vB. It includes a retransmission method because it uses an unreliable datagram transport.# C. ^6 Q+ ?5 K
C. It includes a congestion control mechanism.
( B7 `. p7 |: `D. It is used mostly by applications that use application layer object-security protocols.+ I8 d" m: [; @. ]
E. It completes key negotiation and bulk data transfer over a single channel.
4 ~0 p1 b6 Q/ [; q* rF. It cannot be used if NAT exists along the path.' T' Z( Y& \% \) D1 O
答案B E
* K( x7 F. C5 ^5 M7 @, e4 ^$ K- k
& I X$ a3 O3 T$ S, A7 n
+ p3 J% \6 G2 v: kQUESTION 143
; O8 _* [- [- ]Which two characteristics of DTLS are true?(Choose two)" t% y: K4 [/ k4 Z: ]3 [, a. C( W( D% D
A. It is used mostly by applications that use application layer object-protocols
1 E* j0 J3 l+ o, B+ T/ SB. It includes a congestion control mechanism7 p' y& y: T/ E) C1 W5 b; u% e
C. It completes key negotiation and bulk data transfer over a single channel.
% Q+ b. G1 z) r: ZD. It supports long data transfers and connectionless data transfers.
$ Q( ]( ~9 R/ \1 _# vE. It cannot be used if NAT exists along the path.3 B( O C, |) E. n5 }2 d
F. It concludes a retransmission method because it uses an unreliable datagram transport.
4 I) O& a# ^+ U/ a2 I" |) W5 J答案:BF& v$ L% h, ~" ~
7 i1 Q' p! P1 C3 V5 U! z
4 I o# E4 R1 u2 k/ W
所以应该哪个是对的啊 |
|