The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第1题:
第2题:
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
第3题:
Which description about asymmetric encryption algorithms is correct?()
第4题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第5题:
Which two statements are true regarding B-tree indexs()
第6题:
Which two statements are true regarding B-tree index()
第7题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第8题:
used to verify the identity of the peer
used between the initiator and the responder to establish a basic security policy
used to establish a symmetric shared key via a public key exchange process
used for asymmetric public key encryption
第9题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第10题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第11题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第12题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第13题:
Which three are distinctions between asymmetric and symmetric algorithms? ()
第14题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第15题:
Which of the following statements is correct regarding a hybridcrypto system?()
第16题:
Which two statements regarding asymmetric key encryption are true?()
第17题:
Which two statements are true about encrypting RMAN backup?()
第18题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第19题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第20题:
uses symmetric crypto for keys distribution
uses symmetric crypto for proof of origin
uses symmetric crypto for fast encrypted/decryption
uses asymmetric crypto for message confidentiality
uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session
第21题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第22题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第23题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第24题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.