Most ______ measures involve data encryption and password.
A.security
B.hardware
C.display
D.Program
A.
B.
C.
D.
第1题:
A.Transport
B.Presentation
C.Session
D.Application
第2题:
第3题:
Which of the following best describes a hash function?()
第4题:
主流的对称密码算法主要有DES(Data Encryption Standard)算法,3DES(Triple DES)算法和AES(Advanced Encryption Standard)算法
第5题:
Which of the following technologies is the MOST secure form of wireless encryption?()
第6题:
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
第7题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第8题:
Which three features are provided by Oracle Net Services? ()
第9题:
You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
第10题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第11题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第12题:
An irreversible fast encryption method
A reversible fast encryption method
A reversible value computed from a piece of data and used to detect modifications
An irreversible value computed froma piece of data and used to detect modifications
A table inwhich values are stored for efficient retrieval.
第13题:
● Most (75) measures involve data encryption and password.
(75)
A. security
B. hardware
C. display
D. program
第14题:
第15题:
Which of the following standards or encryption types is the MOST secure for wireless networking?()
第16题:
Which description about asymmetric encryption algorithms is correct?()
第17题:
Data encryption and decryption occurs at which layer of the OSI model?()
第18题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第19题:
Which two statements regarding asymmetric key encryption are true?()
第20题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()
第21题:
对
错
第22题:
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.