91成人精品一区在线播放,成人毛片在线播放器,国产精品剧情av,日韩尤物在线,亚洲麻豆视频,岛国免费在线,亚洲a欧美

軟題庫 學習課程
試卷年份2022年下半年
試題題型【單選題】
試題內容

Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash


查看答案

相關試題

68題: 交換機是構成網(wǎng)絡的基礎設備,主要功能是負責網(wǎng)絡通信數(shù)據(jù)包的交換傳輸。其中工作于 OSI 的數(shù)據(jù)鏈路層,能夠識別數(shù)據(jù)中的 MAC,并根據(jù) MAC 地址選擇轉發(fā)端口的是()
A.第一代交換機
B.第二代交換機
C.第三代交換機
D.第四代交換機
答案解析與討論:www.shc2b.com/st/57414167.html

69題: 以下不屬于網(wǎng)絡設備提供的 SNMP 訪問控制措施的是( )。
A.SNMP權限分級機制
B.限制 SNMP 訪問的IP 地址
C.SNMP 訪問認證
D.關閉 SNMP 訪問
答案解析與討論:www.shc2b.com/st/5741518043.html

70題: 網(wǎng)絡設備的常見漏洞包括拒絕服務漏洞、旁路、代碼執(zhí)行、溢出、內存破壞等。CVE-2000-0945信息顯示思科 Catalyst 3500 XL 交換機的Web 配置接口允許遠程攻擊者不需要認證就執(zhí)行命令,該漏洞屬于( )。
A.拒絕服務漏洞
B.旁路
C.代碼執(zhí)行
D.內存破壞
答案解析與討論:www.shc2b.com/st/5741620645.html