In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第1题:
第2题:
Which three are distinctions between asymmetric and symmetric algorithms? ()
第3题:
What is the objective of Diffie-Hellman?()
第4题:
Which description about asymmetric encryption algorithms is correct?()
第5题:
Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)
第6题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第7题:
PKI是()。
第8题:
path
resv
session
keepalive
第9题:
Only symmetric algorithms have a key exchange technology built in
Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
Only asymmetric algorithms have a key exchange technology built in
Asymmetric algorithms are based on more complex mathematical computations
第10题:
An entity responsible for registering the private key encryption used in a PKI
An agency responsible for granting and revoking public-private key pairs
A trusted third party responsible for signing the public keys of entities in a PKIbased system
A trusted third party responsible for signing the private keys of entities in a PKIbased system
第11题:
In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第12题:
public int hashCode()
public boolean equals(Key k)
public int compareTo(Object o)
public boolean equals(Object o)
public boolean compareTo(Key k)
第13题:
IPSEC技术的IKE(Internet key exchange)协议不包含以下哪个协议?()
第14题:
Which statement is true about a certificate authority?()
第15题:
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()
第16题:
public class Key { private long id1; private long 1d2; // class Key methods } A programmer is developing a class Key, that will be used as a key in a standard java.util.HashMap. Which two methods should be overridden to assure that Key works correctly as a key?()
第17题:
Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()
第18题:
Which two statements regarding asymmetric key encryption are true?()
第19题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第20题:
A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.
The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.
The DH exchange is susceptible to man-in-the-middle attacks.
The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.
A DH exchange provides Perfect Forward Secrecy (PFS).
第21题:
It is locally significant
It is globally significant
It is needed to identify a unique instance of an OSPF database
It is an optional parameter required only if multiple OSPF processes are running on the router
All routers in the same OSPF area must have the same process ID if they are to exchange routing information
第22题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第23题:
In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第24题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.