Which two statements regarding symmetric key encryption are true?() (Choose two.)
第1题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第2题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第3题:
第4题:
What is the objective of Diffie-Hellman?()
第5题:
Which description about asymmetric encryption algorithms is correct?()
第6题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第7题:
Which two statements regarding asymmetric key encryption are true?() (Choose two.)
第8题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第9题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第10题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第11题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第12题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第13题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第14题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第15题:
Which statement is true about a certificate authority?()
第16题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第17题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第18题:
Which two statements regarding asymmetric key encryption are true?()
第19题:
Which two statements are true about encrypting RMAN backup?()
第20题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第21题:
An entity responsible for registering the private key encryption used in a PKI
An agency responsible for granting and revoking public-private key pairs
A trusted third party responsible for signing the public keys of entities in a PKIbased system
A trusted third party responsible for signing the private keys of entities in a PKIbased system
第22题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第23题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK