Most(75)measures involve data encryption and password.
A.security
B.hardware
C.display
D.program
第1题:
A.WEP
B.AES
C.TKIP
D.DES
第2题:
● Most (75) measures involve data encryption and password.
(75)
A. security
B. hardware
C. display
D. program
第3题:
第4题:
Which of the following best describes a hash function?()
第5题:
主流的对称密码算法主要有DES(Data Encryption Standard)算法,3DES(Triple DES)算法和AES(Advanced Encryption Standard)算法
第6题:
Which of the following technologies is the MOST secure form of wireless encryption?()
第7题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第8题:
Which two statements regarding asymmetric key encryption are true?()
第9题:
You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
第10题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第11题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第12题:
An irreversible fast encryption method
A reversible fast encryption method
A reversible value computed from a piece of data and used to detect modifications
An irreversible value computed froma piece of data and used to detect modifications
A table inwhich values are stored for efficient retrieval.
第13题:
A.Transport
B.Presentation
C.Session
D.Application
第14题:
第15题:
第16题:
Which of the following standards or encryption types is the MOST secure for wireless networking?()
第17题:
Which description about asymmetric encryption algorithms is correct?()
第18题:
Data encryption and decryption occurs at which layer of the OSI model?()
第19题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第20题:
Which three features are provided by Oracle Net Services? ()
第21题:
对
错
第22题:
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.