niusouti.com

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sa

题目
There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( 5 ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
(5)处应选_______.



A. plaintext
B. ciphertext
C. sample
D.code

相似考题
更多“There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge o”相关问题
  • 第1题:

    Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.

    A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private


    正确答案:C,A,D,B,C

  • 第2题:

    材料:

    Following a general average incident,ship agents and surveyors play a significant role.A ship agent,in addition to the normal duties of port and husbandry agency,will assist the master in the aftermath of a general average incident to make a declaration which complies with the local law and custom of the port.

    Once the average adjuster has confirmed that security has been obtained from all the interested parties,the agent is instructed by the ship owner to permit delivery of the cargo.If cargo has been discharged to lighten the vessel,or cargo has been transshipped to a final destination,the agent will be responsible for keeping full and complete records of all movements and expenditure attributable to the general average.

    After any incident,a large number of surveyors representing various interests will descend on the vessel.Some of these surveyors will not be involved directly in the general average process.However,if it has become necessary to sacrifice or discharge a part of the cargo before arrival at the final destination stated on the bill of lading,the ship owner will appoint surveyors to report on the condition and quantity of cargo.

    Such surveyors,usually called general average surveyors,will act in the interests of all the parties involved(and may also represent hull and machinery interests).If possible,the account representing expenditure incurred should be examined and approved by the general average surveyor before settlement.

    问题:

    Which of the following is NOT correct as to the general average surveyors ___________.

    A.They may sometimes be involved into the examination and approval of general average expenditures

    B.They may sometimes be involved into the examination and approval of general average sacrifices

    C.They will act in the interests of all the parties involved

    D.They will look at particularly the general average matters

    What does this passage imply for the shipmasters when a general average incident occurred onboard ___________.A.He can rely on greatly the general average surveyors

    B.He can rely on greatly the ship agent

    C.He can rely on greatly the interested parties

    D.He can rely on greatly other surveyors

    The ship agent mentioned in the passage behaves ______.A.for the benefit of the cargo owner

    B.for the benefit of the shipowner

    C.for the benefit of the salvors

    D.for the benefit of the interested parties other than the above

    The security required by the owner of ship and provided by relevant interested parties in general average cases is for the purpose of _______.

    ① contributing to the losses and damages of general average nature;

    ② securing all the general average contributions;

    ③ Securing all the payment of Sue and Labour;

    ④ contributing to the losses and damages of particular average nature.

    A.①③④

    B.①②③

    C.①②

    D.②③④

    请帮忙给出每个问题的正确答案和分析,谢谢!


    问题 1 答案解析:D


    问题 2 答案解析:A


    问题 3 答案解析:B


    问题 4 答案解析:C

  • 第3题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( 4 )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (4)处应选_______.

    A. brute
    B. perfect
    C. atribue
    D. research

    答案:A
    解析:

  • 第4题:

    There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (1)处应选________.


    A. stream
    B.symmetric
    C. asymmetric
    D.advanced

    答案:B
    解析:

  • 第5题:

    Which one of the following is NOT a supported IKE attribute?()

    • A、 PFS group.
    • B、 Encryption algorithm.
    • C、 Hashing Algorithm.
    • D、 Authenticationmethod.
    • E、 Lifetime duration.

    正确答案:A

  • 第6题:

    在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。

    • A、encapsulation-mode tunnel
    • B、transform esp
    • C、esp encryption-algorithm des
    • D、esp encryption-algorithm 3des
    • E、esp authentication-algorithm md5

    正确答案:A,B,C,E

  • 第7题:

    Which two statements describe the functions and operations of IDS and IPS systems?()

    • A、A network administrator entering a wrong password would generate a true-negative alarm.
    • B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    • C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    • D、Cisco IDS works inline and stops attacks before they enter the network.
    • E、Cisco IPS taps the network traffic and responds after an attack.
    • F、Profile-based intrusion detection is also known as "anomaly detection".

    正确答案:B,F

  • 第8题:

    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()

    • A、These attacks send multiple FIN segments forcing TCP connection release.
    • B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
    • C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
    • D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
    • E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

    正确答案:B

  • 第9题:

    The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

    • A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
    • B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
    • C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
    • D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
    • E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

    正确答案:B,C

  • 第10题:

    多选题
    Which two wireless encryption methods are based on the RC4 encryption algorithm?()
    A

    WEP

    B

    CCKM

    C

    AES

    D

    TKIP

    E

    CCMP


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    单选题
    Which algorithm was the first to be found suitable for both digital signing and encryption?()
    A

    HMAC

    B

    RSA

    C

    MD5

    D

    SHA-1


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two network attack statements are true?()
    A

    Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.

    B

    Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.

    C

    DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.

    D

    DoS attacks can consist of IP spoofing and DDoS attacks.

    E

    IP spoofing can be reduced through the use of policy-based routing.

    F

    IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm?()

    A.WEP

    B.CCKM

    C.AES

    D.TKIP

    E.CCMP


    参考答案:A, D

  • 第14题:

    Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。


    A. interpretation
    B.signatures
    C. encryption
    D.decryption

    答案:B
    解析:
    对称加密或私钥加密的基础是通信双方共享同一密钥。发送方使用一个密钥作为数学运算的一部分把明文加密成密文。接收方使用同一密钥把密文解密变成明文。在非对称或公钥加密方法中,每个用户使用两种不同的密钥:一个是只有这个用户知道的私钥;另一个是与其对应的任何人都知道的公钥。根据加密算法,私钥和公钥是数学上相关的。一个密钥用于加密,而另一个用于解密,依赖于实现的通信服务的特点而用法有所不同。此外,公钥加密技术也可以用于报文的数字签名。数字签名时使用发送方的私钥来加密一部分报文。当接收方收到报文时,就用发送方的公钥来解密数字签名,以便对发送方的标识进行验证。

  • 第15题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of (请作答此空 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    A. message
    B. knowledge
    C. algorithm
    D. attack

    答案:D
    解析:

  • 第16题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( 3 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
    (3)应选__________.



    A. message
    B. knowledge
    C. algorithm
    D.attack

    答案:D
    解析:

  • 第17题:

    Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()

    • A、 BPII 
    • B、 SPII-Plus 
    • C、 FPII 
    • D、 EPII-Plus 
    • E、 HPII 
    • F、 HPII-PIus

    正确答案:D,F

  • 第18题:

    Which algorithm was the first to be found suitable for both digital signing and encryption?()

    • A、HMAC
    • B、RSA
    • C、MD5
    • D、SHA-1

    正确答案:B

  • 第19题:

    What are three security problems with Wi-Fi Protected Access (WPA)?()

    • A、WPA is based on the outdated IEEE 802.11i standard.
    • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
    • C、WPA requires a hardware upgrade that may not be supported by all vendors.
    • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
    • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
    • F、WPA is susceptible to a security weakness when preshared keys are used.

    正确答案:D,E,F

  • 第20题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

    • A、WEP
    • B、CCKM
    • C、AES
    • D、TKIP
    • E、CCMP

    正确答案:A,D

  • 第21题:

    Observe the following options carefully, which two attacks focus on RSA? ()

    • A、BPA attack
    • B、Adaptive chosen ciphertext attack
    • C、DDoS attack
    • D、Man-in-the-middle attack

    正确答案:A,B

  • 第22题:

    单选题
    When two fire hose teams are attacking a fire they should().
    A

    use different fire hose pressures

    B

    use fire hoses of different sizes

    C

    not attack the fire from opposite sides

    D

    not wear protective clothing


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
    A

    These attacks send multiple FIN segments forcing TCP connection release.

    B

    These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.

    C

    These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.

    D

    These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.

    E

    These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    多选题
    What are three security problems with Wi-Fi Protected Access (WPA)?()
    A

    WPA is based on the outdated IEEE 802.11i standard.

    B

    WPA uses RSN,which uses the same base encryption algorithm as RC4.

    C

    WPA requires a hardware upgrade that may not be supported by all vendors.

    D

    WPA uses TKIP,which uses the same base encryption algorithm as WEP.

    E

    WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

    F

    WPA is susceptible to a security weakness when preshared keys are used.


    正确答案: E,F
    解析: 暂无解析