( ) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network。
ACertificate
BEncryption
CTunnel
DPresentation
相关试题
-
) is used to ensure the confidentiality, integrity and authenticity of the two end points in the pr
-
aidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash
-
t to reside largely at the end points of the network-the computers-while the specialized routing co
-
t to reside largely at the end points of the network-the computers-while the specialized routing co
-
t to reside largely at the end points of the network-the computers-while the specialized routing co