Questions 59-60 are based on the following information
A hash table With hash function
H1(k)=k mod 13
Is shown below.
Collision is resolved using the hash function H2(k)=(k mod 11)+1
How many key comparisons occur in searching for key 35 in the given hash table?
A.0
B.1
C.2
D.3
第1题:
A.Transaction support
B.FULLTEXT indexing for text matching
C.Table and page level locking support
D.Foreign key support
E.Geospatial indexing
F.HASH index support
G.Table level locking only
第2题:
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.
A.Cryptography
B.decode
C.privacy
D.security@@@SXB@@@A.Conduction
B.confidence
C.confidentiality
D.connection@@@SXB@@@A.Authentication
B.structure
C.encryption
D.exchange@@@SXB@@@A.Algorithm
B.Secure
C.structure
D.encryption@@@SXB@@@A.Confidentiality
B.integrity
C.service
D.robustness
第3题:
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
第4题:
第5题:
Which two steps does a receiver perform to validate a message using HMAC? ()
第6题:
Which data organization schemes are supported?()
第7题:
通过hash 掩码方式实现RP 的负载分担,以下描述正确的有()
第8题:
Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch?()
第9题:
Which three are properties of the MyISAM storage engine?()
第10题:
sysdumpdev -k
sysdumpdev -L
sysdumpdev -K
sysdumpdev -P
第11题:
Use default Layer 4 hash in core.
Use default Layer 3 hash in distribution.
Use default Layer 4 hash in distribution.
Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
第12题:
decrypts the received MAC using a secret key
compares the computed MAC vs. the MAC received
authenticate the receivedmessage using the sender’s public key
look up the sender’s public key
extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
Computes the MAC using the receivedmessage and a secret key as inputs to the hash function
第13题:
设线性表(59,53,46,48,37,31,25)采用散列(Hash)法进行存储和查找,散列函数为H(Key)=Key MOD 7(MOD表示整除取余运算)。若用链地址法解决冲突(即将相互冲突的元素存储在同一个单链表中)构造散列表,则散列表中与哈希地址 (38) 对应的单链表最长。
A.2
B.3
C.4
D.6
第14题:
散列地址空间为0..(m-1),k为关键字,用整数p去除k,将其余数作为k的散列地址,即hash(k)=k%p。为了减少发生冲突的可能性,一般取p为(35)。
A.小于等于m的最大奇数
B.小于等于m的最大质数
C.小于等于m的最大偶数
D.小于等于m的最大合数
第15题:
● 若线性表(24, 13, 31, 6, 15, 18, 8)采用散列(Hash)法进行存储和查找,设散列函数为H(Key)=Key mod 11,则构造散列表时发生冲突的元素为 (1) 。(其中的mod表示整除取余运算)
(1)
A. 24和13
B. 6 和15
C. 6 和24
D. 18和8
第16题:
第17题:
The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()
第18题:
设有一个含有13个元素的Hash表(0~12),Hash函数是:H(key)=key%13,其中%是求余数运算。用线性探查法解决冲突,则对于序列(2、8、31、20、19、18、53、27),18应放在第几号格中()。
第19题:
Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()
第20题:
In which scenario will you create a sorted hash cluster? ()
第21题:
根据Hash函数的安全水平,人们将Hash函数分成两大类,分别是()
第22题:
Hash address: Selects the server by using a hash value based on either the source or destination IP address, or both
Hash URL: Selects the server by using a hash value based on the requested URL
Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or both
Hash header: Selects the server by using a hash value based on the HTTP header name
Hash IP: Selects the server using a hash value based on the IP address
第23题:
弱碰撞自由的Hash函数
强碰撞自由的Hash函数
强Hash函数
弱Hash函数