- 积分
- 68
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
, L% D+ A" U% g h# M, v4 d7 j
400-251 VCE 题库里有个问题,请教一下
7 }7 |' R" _ A% P. bQUESTION 79
, g5 F5 f! D: T/ VWhich two characteristics of DTLS are true? (Choose two)
. K3 p$ F3 u* n# e& v' I1 S9 q( IA. It supports long data transfers and connectionless data transfers. H; w% E6 n5 m$ P% B$ d
B. It includes a retransmission method because it uses an unreliable datagram transport., G/ J' b# A% e' _9 b/ U
C. It includes a congestion control mechanism.9 ^& ~8 G5 d: K* V
D. It is used mostly by applications that use application layer object-security protocols.' _, z" T. J0 _% T/ q( \' D
E. It completes key negotiation and bulk data transfer over a single channel.
9 V- ?1 k! a1 j! n/ RF. It cannot be used if NAT exists along the path.
1 O7 Q% C# C1 n答案B E
/ x" G5 e: S* w
& g5 E+ t: c: p1 A2 Q' Z# F) f( L8 P; J
QUESTION 1434 q4 }2 V; E" T7 U: R0 U( M1 v
Which two characteristics of DTLS are true?(Choose two)! @; k0 z# w! `& y5 A
A. It is used mostly by applications that use application layer object-protocols
% C5 ^ T6 Z; k+ C6 dB. It includes a congestion control mechanism2 O$ y( y8 [7 i) w U5 o- a
C. It completes key negotiation and bulk data transfer over a single channel.
4 _# B H0 X( O! m, o, r1 H+ l$ }D. It supports long data transfers and connectionless data transfers.
2 I" q( f5 a8 Z% r. O; g* w; pE. It cannot be used if NAT exists along the path.( M5 W0 R# @7 T3 E; `0 o; r/ G+ `
F. It concludes a retransmission method because it uses an unreliable datagram transport.7 T/ I$ |7 _+ d
答案:BF
u7 Y3 n& c0 i; p1 B8 I4 s7 X: i/ N4 k& U4 ?0 @, r3 Y
( ]% b0 j3 G. q4 m
所以应该哪个是对的啊 |
|