There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
A.stream B.symmetric C.asymmetric D.advancedA.operation B.publication C.plaintext D.ciphertextA.message B.knowledge C.algorithm D.attackA.brute B.perfect C.atribue D.re searchA.plaintext B.ciphertext C.sample D.code
第1题:
A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP
第2题:
第3题:
第4题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第5题:
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
第6题:
Which two statements regarding asymmetric key encryption are true?()
第7题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第8题:
WEP
CCKM
AES
TKIP
CCMP
第9题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第10题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第11题:
Source TCP port
Source IP address
Destination TCP port
Destination IP address
第12题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第13题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第14题:
第15题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第16题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第17题:
Which two statements best describe enhanced wireless security encryption?()
第18题:
Which two statements are true about encrypting RMAN backup?()
第19题:
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
None of the other alternatives apply
第20题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第21题:
use different fire hose pressures
use fire hoses of different sizes
not attack the fire from opposite sides
not wear protective clothing
第22题:
HMAC
RSA
MD5
SHA-1
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.