The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第1题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第2题:
第3题:
Which description about asymmetric encryption algorithms is correct?()
第4题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第5题:
Which two statements regarding asymmetric key encryption are true?()
第6题:
Which two statements are true about encrypting RMAN backup?()
第7题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第8题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第9题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第10题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第11题:
the two methods of authentication using the WEP encryption are open and shared key
the 802.11 standard defines WEP security using 128-bit keys
WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
WEP is a scalable encryption solution that uses static keys for authentication
WEP security provides only one-way authentication
WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
第12题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第13题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第14题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第15题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第16题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第17题:
Which two statements regarding asymmetric key encryption are true?() (Choose two.)
第18题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第19题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第20题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第21题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第22题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第23题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第24题:
It specifies use of a static encryption key that must be changed frequently to enhance security
It requires use of an open authentication method
It specifies the use of dynamic encryption keys that change each time a client establishes a connection
It requires that all access points and wireless devices use the same encryption key
It includes authentication by PSK