There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sa

题目

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

A.stream B.symmetric C.asymmetric D.advancedA.operation B.publication C.plaintext D.ciphertextA.message B.knowledge C.algorithm D.attackA.brute B.perfect C.atribue D.re searchA.plaintext B.ciphertext C.sample D.code


相似考题
更多“There are two general approaches to attacking a ( )encryption scheme.The first attack is k ”相关问题
  • 第1题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm?()

    A.WEP

    B.CCKM

    C.AES

    D.TKIP

    E.CCMP


    参考答案:A, D

  • 第2题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( 4 )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (4)处应选_______.

    A. brute
    B. perfect
    C. atribue
    D. research

    答案:A
    解析:

  • 第3题:

    There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    (1)处应选________.


    A. stream
    B.symmetric
    C. asymmetric
    D.advanced

    答案:B
    解析:

  • 第4题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第5题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

    • A、WEP
    • B、CCKM
    • C、AES
    • D、TKIP
    • E、CCMP

    正确答案:A,D

  • 第6题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第7题:

    Which two statements are true about encrypting RMAN backup?() (Choose two.)

    • A、The transparent encryption of backups uses the encryption wallet
    • B、The database uses the same encryption key for every encrypted backup
    • C、The password encryption of backups only uses the password while creating and restoring backup
    • D、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

    正确答案:A,C

  • 第8题:

    多选题
    Which two wireless encryption methods are based on the RC4 encryption algorithm?()
    A

    WEP

    B

    CCKM

    C

    AES

    D

    TKIP

    E

    CCMP


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding asymmetric key encryption are true?()
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true about encrypting RMAN backup?()
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD  command to make password-protected backups


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    单选题
    You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()
    A

    Source TCP port

    B

    Source IP address

    C

    Destination TCP port

    D

    Destination IP address


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about encrypting RMAN backup?() (Choose two.)
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    A.It specifies use of a static encryption key that must be changed frequently to enhance security

    B.It requires use of an open authentication method

    C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

    D.It requires that all access points and wireless devices use the same encryption key

    E.It includes authentication by PSK


    参考答案:C, E

  • 第14题:

    There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of (请作答此空 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

    A. message
    B. knowledge
    C. algorithm
    D. attack

    答案:D
    解析:

  • 第15题:

    Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

    • A、the two methods of authentication using the WEP encryption are open and shared key
    • B、the 802.11 standard defines WEP security using 128-bit keys
    • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
    • D、WEP is a scalable encryption solution that uses static keys for authentication
    • E、WEP security provides only one-way authentication
    • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

    正确答案:A,E

  • 第16题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第17题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第18题:

    Which two statements are true about encrypting RMAN backup?()

    • A、 The transparent encryption of backups uses the encryption wallet
    • B、 The database uses the same encryption key for every encrypted backup
    • C、 The password encryption of backups only uses the password while creating and restoring backup
    • D、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD  command to make password-protected backups

    正确答案:A,C

  • 第19题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about encrypting RMAN backup?()
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    单选题
    When two fire hose teams are attacking a fire they should().
    A

    use different fire hose pressures

    B

    use fire hoses of different sizes

    C

    not attack the fire from opposite sides

    D

    not wear protective clothing


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which algorithm was the first to be found suitable for both digital signing and encryption?()
    A

    HMAC

    B

    RSA

    C

    MD5

    D

    SHA-1


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析