Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encry

题目

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

  • A、A session key value is exchanged across the network.
  • B、A session key never passes across the network.
  • C、A session key is used as the key for asymmetric data encryption.
  • D、A session key is used as the key for symmetric data encryption.

相似考题
参考答案和解析
正确答案:B
更多“Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encry”相关问题
  • 第1题:

    Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

    A. A session key value is exchanged across the network.

    B. A session key never passes across the network.

    C. A session key is used as the key for asymmetric data encryption.

    D. A session key is used as the key for symmetric data encryption.


    参考答案:B

  • 第2题:

    How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?()

    A. F2 key

    B. F6 key

    C. F8 key

    D. F9 key


    参考答案:D

  • 第3题:

    What is the objective of Diffie-Hellman?()

    • A、used to verify the identity of the peer
    • B、used between the initiator and the responder to establish a basic security policy
    • C、used to establish a symmetric shared key via a public key exchange process
    • D、used for asymmetric public key encryption

    正确答案:C

  • 第4题:

    要在session对象中保存属性,可以使用以下哪个语句?()

    • A、session.getAttribute(“key”,”value”)
    • B、session.setAttribute(“key”,”value”)
    • C、session.setAtrribute(“key”)
    • D、session.getAttribute(“key”)

    正确答案:A

  • 第5题:

    How can an operator temporarily gain access to the command line while in a smit session, without losing the current smit session?()

    • A、F2 key
    • B、F6 key
    • C、F8 key
    • D、F9 key

    正确答案:D

  • 第6题:

    Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)

    • A、In the DH key exchange process, the session key is never passed across the network.
    • B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
    • C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
    • D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

    正确答案:A,B

  • 第7题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:A,D

  • 第8题:

    Which two statements regarding asymmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:B,C

  • 第9题:

    多选题
    Which three are distinctions between asymmetric and symmetric algorithms? ()
    A

    Only symmetric algorithms have a key exchange technology built in

    B

    Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms

    C

    Only asymmetric algorithms have a key exchange technology built in

    D

    Asymmetric algorithms are based on more complex mathematical computations


    正确答案: B,C,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)
    A

    In the DH key exchange process, the session key is never passed across the network.

    B

    In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C

    In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D

    In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    单选题
    What is the objective of Diffie-Hellman?()
    A

    used to verify the identity of the peer

    B

    used between the initiator and the responder to establish a basic security policy

    C

    used to establish a symmetric shared key via a public key exchange process

    D

    used for asymmetric public key encryption


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)

    A. In the DH key exchange process, the session key is never passed across the network.

    B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    参考答案:A, B

  • 第14题:

    Which three are distinctions between asymmetric and symmetric algorithms? ()

    • A、Only symmetric algorithms have a key exchange technology built in
    • B、Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
    • C、Only asymmetric algorithms have a key exchange technology built in
    • D、Asymmetric algorithms are based on more complex mathematical computations

    正确答案:B,C,D

  • 第15题:

    Which statement is true regarding the password-recovery process?()

    • A、You must have a console connection
    • B、You cannot set the console port to an insecure mode
    • C、You must press the Enter key so that you can boot into single-user mode
    • D、When prompted to enter the full pah name of the shell you must press the Enter key

    正确答案:A

  • 第16题:

    Which description about asymmetric encryption algorithms is correct?()

    • A、They use the same key for encryption and decryption of data.
    • B、They use different keys for decryption but the same key for encryption of data.
    • C、They use different keys for encryption and decryption of data.
    • D、They use the same key for decryption but different keys for encryption of data.

    正确答案:C

  • 第17题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    • A、symmetric key encryption
    • B、asymmetric key encryption
    • C、RSA
    • D、digital certificates

    正确答案:A

  • 第18题:

    Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()

    • A、In the DH key exchange process, the session key is never passed across the network.
    • B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
    • C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
    • D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

    正确答案:A,B

  • 第19题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第20题:

    Which statements are true regarding the Query Result Cache?() 

    • A、 It can be set at the system, session, or table level.
    • B、 It is used only across statements in the same session.
    • C、 It can store the results from normal as well as flashback queries.
    • D、 It can store the results of queries based on normal,temporary,and dictionary tables.

    正确答案:A,C

  • 第21题:

    单选题
    Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
    A

    A session key value is exchanged across the network.

    B

    A session key never passes across the network.

    C

    A session key is used as the key for asymmetric data encryption.

    D

    A session key is used as the key for symmetric data encryption.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements regarding asymmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    单选题
    要在session对象中保存属性,可以使用以下哪个语句?()
    A

    session.getAttribute(“key”,”value”)

    B

    session.setAttribute(“key”,”value”)

    C

    session.setAtrribute(“key”)

    D

    session.getAttribute(“key”)


    正确答案: B
    解析: 暂无解析