单选题The RSA algorithm is an example of what type of cryptography?RSA算法是下面哪种算法的典型例子?()A Private Key.私钥B Symmetric Key对称密钥C Secret Key秘密密钥D Asymmetric Key.非对称密钥

题目
单选题
The RSA algorithm is an example of what type of cryptography?RSA算法是下面哪种算法的典型例子?()
A

Private Key.私钥

B

Symmetric Key对称密钥

C

Secret Key秘密密钥

D

Asymmetric Key.非对称密钥


相似考题
更多“The RSA algorithm is an example of what type of cryptography”相关问题
  • 第1题:

    All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

    A. Cryptography
    B.decode
    C.privacy
    D.security

    答案:A
    解析:

  • 第2题:

    All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash(本题)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.

    A.Algorithm
    B.Secure
    C.structure
    D.encryption

    答案:A
    解析:

  • 第3题:

    (71)is the science of hiding information。Whereas the goal of cryptography is to make data unreadable by a third party。the goal of steganography is to hide the data from a third party。In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software。

      There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spy movies),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication。With computers and networks,there are many other ways of hiding informations,such as:

      Covert channels(c,g,Loki and some distributed denial-of-service tools use the Internet Control(3)Protocol,or ICMP,as the communication channel between the“bad guy”and a compromicyed system)

      Hidden text within Web pages

      Hiding files in“plain sight”(c,g,what better place to“hide”a file than with an important sounding name in the c:\winnt system32 directory)

      Null ciphers(c,g,using the first letter of each word to form a hidden message in an otherwise innocuous text)

      steganography today,however,is significantly more(4)than the example about suggest,allowing a user to hide large amounts of information within image and audio。These forms of steganography often are used in conjunction with cryptography so the information is double protected;first it is encrypted and then hidden so that an advertisement first。find the information(an often difficult task in and of itself)and the decrypted it。

      The simplest approach to hiding data within an image file is called(5)signature insertion。In this method ,we can take the binary representation of the hidden data and the bit of each byte within the covert image。If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye。

    (71)处的单词应是

    A.Cryptography
    B.Geography
    C.Stenography
    D.Steganography

    答案:A
    解析:
    该段译文如下:
    信息隐藏学是隐藏信息的科学。而密码学的目的是让数据对于第三方不可识别,而信息隐藏学的目的则是将数据对于第三方隐藏起来。本文,我将论述信息隐藏学是什么、它的目的是什么,并且会提供使用可行软件的案例。
    有许多信息隐藏的方法实际上我们都很熟悉(特别是如果你看过一些谍战片!),从隐型墨水和微小的点点,到将信息暗含在一大段文字的每个单词的第二个字母中,还有无线通信中的扩频技术等等。使用计算机和网络,有许多其他的隐藏信息的方法,比如:
    转换信道(e.g.,洛基和一些分布式拒绝服务工具使用网际控制管理协议,或叫做icmp,作为“坏人”和受攻击的系统之间的通信信道)
    隐藏信息在网页中
    隐藏文件在“眼皮儿底下”(比如,隐藏信息在什么地方比给它取一个重要的熟悉名字放置在目录C:\winnt\system32中更好?)
    空域算法(比如,使用一段毫不相干的文字中每个单词的首写字母来表示一个隐藏的信息)
    隐写术在今天,然而明显比上面的例子更强大,允许用户隐藏大量的信息在图像和音频文件,这些形式的隐写术通常用于结合密码学,信息是双重保护的。
    最简单的方法来隐藏数据,是将信息嵌入在图像文件的像素位上(lsb),在这种方法中,我们可以把隐藏的二进制表示数据和覆盖的每个字节的图片,如果我们使用的是24位颜色,数量的变化是最小的并且肉眼是看不见的。

  • 第4题:

    By default, what type of SSH server key is generated by Cisco NX-OS Software?()

    • A、 DSA key generated with 512 bits
    • B、 RSA key generated with 768 bits
    • C、 RSA key generated with 1024 bits
    • D、 DSA key generated with 1024 bits
    • E、 RSA key generated with 2048 bits

    正确答案:C

  • 第5题:

    A Cisco router has been configured with the following command:IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0his is an example of what type of NAT?()

    • A、Static NAT
    • B、Dynamic NAT
    • C、Dynamic NAT with overload
    • D、Port Address Translation
    • E、None of the above

    正确答案:B

  • 第6题:

    给定TheBean类,假设还没有创建TheBean类的实例,以下哪些JSP标准动作语句能创建这个bean的一个新实例,并把它存储在请求作用域?()

    • A、〈jsp:useBean name="myBean" type="com.example.TheBean"/〉
    • B、〈jsp:takeBean name="myBean" type="com.example.TheBean"/〉
    • C、〈jsp:useBean id="myBean" class="com.example.TheBean" scope="request"/〉
    • D、〈jsp:takeBean id="myBean" class="com.example.TheBean" scope="request"/〉

    正确答案:C

  • 第7题:

    An electrician needs to know what type of receptacle is required. What is the most up-to-date resource to identify the plug type for the feature code ordered?()

    • A、Infocenter
    • B、ITSO Redbooks
    • C、Facts and Features
    • D、System Planning Tool

    正确答案:A

  • 第8题:

    When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()

    • A、 algorithm = failover
    • B、 algorithm = round_robin
    • C、 reserve_policy = no_reserve
    • D、 reserve_policy = single_path

    正确答案:C

  • 第9题:

    单选题
    Kerberos depends upon what encryption method?Kerberos依赖于那种加密算法()
    A

    Blowfish cryptography.Blowfish加密

    B

    PublicKey cryptography.公钥加密

    C

    ElGamal cryptography.ElGamal加密

    D

    SecretKey cryptography.秘密密钥加密


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You need to create a JavaBean object that is used only within the current JSP page. It must NOT beaccessible to any other page including those that this page might import. Which JSP standard action canaccomplish this goal?()
    A

    <jsp:useBean id=’pageBean’ type=’com.example.MyBean’ />

    B

    <jsp:useBean id=’pageBean’ class=’com.example.MyBean’ />

    C

    <jsp:makeBean id=’pageBean’ type=’com.example.MyBean’ />

    D

    <jsp:makeBean id=’pageBean’ class=’com.example.MyBean’ />


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    What OSPF LSA is used to support MPLS-traffic Engineering ?()
    A

    External LSA (Type 5 )

    B

    Opaque LSA (Type 9 )

    C

    Opaque LSA (Type 10 )

    D

    Opaque LSA (Type 11 )

    E

    NSSA LSA (Type 7 )


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()
    A

    Level 1 internal routes

    B

    Level 1 external routes

    C

    Level 2 internal routes

    D

    Level 2 external routes


    正确答案: A
    解析: 暂无解析

  • 第13题:

    All three types of cryptography schemes have unique function mapping to specific.For example,the synunetric key(71)approach is typically used for theencryption of data providmg(72),whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation,thereby providing confidentiality and authentication.The hash(74)(noncryptic),on the other hand,does not provide confidentiality but provides messageintegrity,and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
    请作答72题。

    A.Conduction
    B.confidence
    C.confidentiality
    D.connection

    答案:C
    解析:

  • 第14题:

    All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

    A.Algorithm
    B.Secure
    C.structure
    D.encryption

    答案:A
    解析:

  • 第15题:

    The DES algorithm is an example of what type of cryptography?DES算法是下面哪一个加密算法的一个样例?()

    • A、Secre tKey.秘密密钥
    • B、Asymmetric Key.非对称密钥
    • C、Two-key双密钥
    • D、Public Key.公钥

    正确答案:A

  • 第16题:

    What OSPF LSA is used to support MPLS-traffic Engineering ?()

    • A、External LSA (Type 5 )
    • B、Opaque LSA (Type 9 )
    • C、Opaque LSA (Type 10 )
    • D、Opaque LSA (Type 11 )
    • E、NSSA LSA (Type 7 )

    正确答案:C

  • 第17题:

    一个元素内容中既含有文本也含有子元素,应当怎样定义()

    • A、<xs:element name="example" type=" xs:mixed ">
    • B、<xs:element name="example"> <xs:complexType>
    • C、<xs:element name="example"> <xs:complexType mixed="false">
    • D、<xs:element name="example"> <xs:complexType mixed="true">

    正确答案:D

  • 第18题:

    what is four ospf area type?


    正确答案:backbone,normal,stub,nssa。

  • 第19题:

    What is the type and scope of the LSA required to support traffic engineering in an OSPFenvironment?()

    • A、Type 9, AS scope
    • B、Type 10, AS scope
    • C、Type 10, Area scope
    • D、Type 9, Area scope

    正确答案:C

  • 第20题:

    单选题
    By default, what type of SSH server key is generated by Cisco NX-OS Software?()
    A

     DSA key generated with 512 bits

    B

     RSA key generated with 768 bits

    C

     RSA key generated with 1024 bits

    D

     DSA key generated with 1024 bits

    E

     RSA key generated with 2048 bits


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    The result of two forces acting in opposite directions and along parallel lines,is an example of what type of stress?()
    A

    Tensile

    B

    Compression

    C

    Shear

    D

    Strain


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()
    A

     algorithm = failover

    B

     algorithm = round_robin

    C

     reserve_policy = no_reserve

    D

     reserve_policy = single_path


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A Cisco router has been configured with the following command:IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0his is an example of what type of NAT?()
    A

    Static NAT

    B

    Dynamic NAT

    C

    Dynamic NAT with overload

    D

    Port Address Translation

    E

    None of the above


    正确答案: D
    解析: 暂无解析