参考答案和解析
正确答案:C
更多“77 The person sending a message is NOT influenced by which of the followingA. sender's credibilityB. receiver's assumptionsC. receiver's evaluative and tendencyD. receiver's attitude and needsE. sender's knowledge”相关问题
  • 第1题:

    TCP service is obtained by having both the sender and the receiver create end points, which are called

    A.network address

    B.supernet address

    C.socket

    D.IP address


    正确答案:C

  • 第2题:

    Which two statements are true about TCP communication?()

    A. The receiver acknowledges the final packet in each communications stream.

    B. The receiver adds sequencing numbers to the packets received.

    C. The sender adds sequencing numbers to the packets it sends.

    D. The receiver acknowledges each packet it receives from the sending device.


    参考答案:A, C

  • 第3题:

    A TCP/IP Transfer is diagrammed in the exhibit.A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?()

    A.Send ACK 1-3

    B.Send ACK 3

    C.Send ACK 4

    D.Send ACK 4-6

    E.Send ACK 6

    F.Send ACK 7


    参考答案:C

  • 第4题:

    You are cordially invited to a formal_____being held in honor of the company's new vice president.

    A. receipt
    B. receiving
    C. receiver
    D. reception

    答案:D
    解析:
    句子表示“收到参加欢迎会的邀请”,因此意为“欢迎会”D为正确答案。

  • 第5题:

    Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet.

    A. multicast
    B. unicast
    C. broadcast
    D. multiple unicast

    答案:B
    解析:
    任何时候主机或路由器要发送 IP 数据报发送给另一主机或路由器时,都需要知道接收方的逻辑地址。发送主机从 DNS 获得该地址,发送路由器则在路由表中找到该地址。但 IP 数据报必须封装在帧中才能通过物理网络。这意味着发送者需要知道接收者的物理地址。主机或路由器需发送 ARP 查询报文,该报文分组包含发送者的物理地址和 IP 地址及接收者的 IP 地址。这是因为送者不知道接收者的物理地址,所以需在全网广播报文。网络上的每个主机或路由器都能接收并处理该 ARP 查询报文,但只有预期的接收者识别其 IP 地址并响应该 ARP 报文。响应报文包含接收者的 IP 地址和物理地址。包含了接收者物理地址的响应报文分组通过单播的方式直接发送给发送者。

  • 第6题:

    Which two steps does a receiver perform to validate a message using HMAC? ()  

    • A、 decrypts the received MAC using a secret key
    • B、 compares the computed MAC vs. the MAC received
    • C、 authenticate the receivedmessage using the sender’s public key
    • D、 look up the sender’s public key
    • E、 extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
    • F、 Computes the MAC using the receivedmessage and a secret key as inputs to the hash function

    正确答案:B,F

  • 第7题:

    With PGP, which of the following entity signs a users’s public key?()

    • A、 The sender of the message.
    • B、 The receipient of the message.
    • C、 The sender’s administrator who provides the sender with the PGP program.
    • D、 A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.
    • E、 The vendor of the PGP program.

    正确答案:D

  • 第8题:

    在直接通信方式中,系统提供的发送原语是()。

    • A、send(receiver,message)
    • B、send(sender,message)
    • C、send(sender,receiver)
    • D、send(receiver,sender)

    正确答案:A

  • 第9题:

    单选题
    With PGP, which of the following entity signs a users’s public key?()
    A

     The sender of the message.

    B

     The receipient of the message.

    C

     The sender’s administrator who provides the sender with the PGP program.

    D

     A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.

    E

     The vendor of the PGP program.


    正确答案: E
    解析: 暂无解析

  • 第10题:

    单选题
    What does not contribute to the commercial GPS receiver position error().
    A

    Satellite clock

    B

    Ship's speed

    C

    Atmospheric/ionospheric propagation

    D

    Receiver


    正确答案: B
    解析: 暂无解析

  • 第11题:

    问答题
    Practice 2  (1) In order to communicate thoughts and feelings, there must be a conventional system of signs or symbols which mean the same to the sender and the receiver. The means of sending communications are too numerous and varied for systematic classification. Therefore, the analysis must begin with the means of receiving communication. (2) Reception of communication is achieved by our senses.

    正确答案:
    (1) 为了交流思想和情感,必须有一个对发送者和接受者有着相同含义传统的符号或象征系统。
    (2) 人们用感官知觉来接受人际交流。
    解析: 暂无解析

  • 第12题:

    多选题
    Which two steps does a receiver perform to validate a message using HMAC? ()
    A

    decrypts the received MAC using a secret key

    B

    compares the computed MAC vs. the MAC received

    C

    authenticate the receivedmessage using the sender’s public key

    D

    look up the sender’s public key

    E

    extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC

    F

    Computes the MAC using the receivedmessage and a secret key as inputs to the hash function


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    在直接通信方式中,系统提供的发送原语是

    A.send(receiver,message)

    B.send(sender,message)

    C.send(sender,receiver)

    D.send(receiver,sender)


    正确答案:A

  • 第14题:

    Scrambling of SONET signals is done to ().

    A. prevent the leakage of external fiber emissions

    B. provide the optical network with the highest level of security possible

    C. assure an even distribution of 1‘s and 0‘s for extended transmitter life

    D. assure an adequate number of transitions for clock recovery at the receiver

    E. prevent the receiver from assuming AIS inadvertently when all 0‘s are received


    参考答案:D

  • 第15题:

    What does not contribute to the commercial GPS receiver position error ________.

    A.Satellite clock

    B.Ship's speed

    C.Atmospheric/ionospheric propagation

    D.Receiver


    正确答案:B

  • 第16题:

    Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。


    A. interpretation
    B.signatures
    C. encryption
    D.decryption

    答案:B
    解析:
    对称加密或私钥加密的基础是通信双方共享同一密钥。发送方使用一个密钥作为数学运算的一部分把明文加密成密文。接收方使用同一密钥把密文解密变成明文。在非对称或公钥加密方法中,每个用户使用两种不同的密钥:一个是只有这个用户知道的私钥;另一个是与其对应的任何人都知道的公钥。根据加密算法,私钥和公钥是数学上相关的。一个密钥用于加密,而另一个用于解密,依赖于实现的通信服务的特点而用法有所不同。此外,公钥加密技术也可以用于报文的数字签名。数字签名时使用发送方的私钥来加密一部分报文。当接收方收到报文时,就用发送方的公钥来解密数字签名,以便对发送方的标识进行验证。

  • 第17题:

    国外不少旅游管理专家在考核导游人员时,坚持A.S.K的原则,它们分别是指()。

    A.“A” ( Active )
    B.“S” ( Smile )
    C.“A” ( Attitude )
    D.“S”(Skill)
    E.“K”(Knowledge)

    答案:C,D,E
    解析:
    “A”代表Attitude(态度);“S”代表Skill(技能)“K”代表Knowledge(知识 ),它是旅游管理专家在考核导游人员时常用的原则。

  • 第18题:

    Scrambling of SONET signals is done to ().

    • A、prevent the leakage of external fiber emissions
    • B、provide the optical network with the highest level of security possible
    • C、assure an even distribution of 1's and 0's for extended transmitter life
    • D、assure an adequate number of transitions for clock recovery at the receiver
    • E、prevent the receiver from assuming AIS inadvertently when all 0's are received

    正确答案:D

  • 第19题:

    Which two statements are true about TCP communication?()

    • A、The receiver acknowledges the final packet in each communications stream.
    • B、The receiver adds sequencing numbers to the packets received.
    • C、The sender adds sequencing numbers to the packets it sends.
    • D、The receiver acknowledges each packet it receives from the sending device.

    正确答案:A,C

  • 第20题:

    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

    • A、 the business knowledge of the IT staff
    • B、 the technical knowledge of the IT staff
    • C、 the company’s business objectives
    • D、 the company’s network topology
    • E、 the IT future directions

    正确答案:C

  • 第21题:

    单选题
    Scrambling of SONET signals is done to ().
    A

    prevent the leakage of external fiber emissions

    B

    provide the optical network with the highest level of security possible

    C

    assure an even distribution of 1's and 0's for extended transmitter life

    D

    assure an adequate number of transitions for clock recovery at the receiver

    E

    prevent the receiver from assuming AIS inadvertently when all 0's are received


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true about TCP communication?()
    A

    The receiver acknowledges the final packet in each communications stream.

    B

    The receiver adds sequencing numbers to the packets received.

    C

    The sender adds sequencing numbers to the packets it sends.

    D

    The receiver acknowledges each packet it receives from the sending device.


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: C
    解析: 暂无解析