第1题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第2题:
材料:
Following a general average incident,ship agents and surveyors play a significant role.A ship agent,in addition to the normal duties of port and husbandry agency,will assist the master in the aftermath of a general average incident to make a declaration which complies with the local law and custom of the port.
Once the average adjuster has confirmed that security has been obtained from all the interested parties,the agent is instructed by the ship owner to permit delivery of the cargo.If cargo has been discharged to lighten the vessel,or cargo has been transshipped to a final destination,the agent will be responsible for keeping full and complete records of all movements and expenditure attributable to the general average.
After any incident,a large number of surveyors representing various interests will descend on the vessel.Some of these surveyors will not be involved directly in the general average process.However,if it has become necessary to sacrifice or discharge a part of the cargo before arrival at the final destination stated on the bill of lading,the ship owner will appoint surveyors to report on the condition and quantity of cargo.
Such surveyors,usually called general average surveyors,will act in the interests of all the parties involved(and may also represent hull and machinery interests).If possible,the account representing expenditure incurred should be examined and approved by the general average surveyor before settlement.
问题:
Which of the following is NOT correct as to the general average surveyors ___________.
A.They may sometimes be involved into the examination and approval of general average expenditures
B.They may sometimes be involved into the examination and approval of general average sacrifices
C.They will act in the interests of all the parties involved
D.They will look at particularly the general average matters
What does this passage imply for the shipmasters when a general average incident occurred onboard ___________.A.He can rely on greatly the general average surveyors
B.He can rely on greatly the ship agent
C.He can rely on greatly the interested parties
D.He can rely on greatly other surveyors
The ship agent mentioned in the passage behaves ______.A.for the benefit of the cargo owner
B.for the benefit of the shipowner
C.for the benefit of the salvors
D.for the benefit of the interested parties other than the above
The security required by the owner of ship and provided by relevant interested parties in general average cases is for the purpose of _______.
① contributing to the losses and damages of general average nature;
② securing all the general average contributions;
③ Securing all the payment of Sue and Labour;
④ contributing to the losses and damages of particular average nature.
A.①③④
B.①②③
C.①②
D.②③④
请帮忙给出每个问题的正确答案和分析,谢谢!
第3题:
第4题:
第5题:
Which one of the following is NOT a supported IKE attribute?()
第6题:
在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。
第7题:
Which two statements describe the functions and operations of IDS and IPS systems?()
第8题:
How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
第9题:
The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
第10题:
WEP
CCKM
AES
TKIP
CCMP
第11题:
HMAC
RSA
MD5
SHA-1
第12题:
Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
DoS attacks can consist of IP spoofing and DDoS attacks.
IP spoofing can be reduced through the use of policy-based routing.
IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
第13题:
A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP
第14题:
第15题:
第16题:
第17题:
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
第18题:
Which algorithm was the first to be found suitable for both digital signing and encryption?()
第19题:
What are three security problems with Wi-Fi Protected Access (WPA)?()
第20题:
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
第21题:
Observe the following options carefully, which two attacks focus on RSA? ()
第22题:
use different fire hose pressures
use fire hoses of different sizes
not attack the fire from opposite sides
not wear protective clothing
第23题:
These attacks send multiple FIN segments forcing TCP connection release.
These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
第24题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.