77 The person sending a message is NOT influenced by which of the following
A. sender's credibility
B. receiver's assumptions
C. receiver's evaluative and tendency
D. receiver's attitude and needs
E. sender's knowledge
第1题:
TCP service is obtained by having both the sender and the receiver create end points, which are called
A.network address
B.supernet address
C.socket
D.IP address
第2题:
A. The receiver acknowledges the final packet in each communications stream.
B. The receiver adds sequencing numbers to the packets received.
C. The sender adds sequencing numbers to the packets it sends.
D. The receiver acknowledges each packet it receives from the sending device.
第3题:
A TCP/IP Transfer is diagrammed in the exhibit.A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?()

A.Send ACK 1-3
B.Send ACK 3
C.Send ACK 4
D.Send ACK 4-6
E.Send ACK 6
F.Send ACK 7
第4题:
第5题:
第6题:
Which two steps does a receiver perform to validate a message using HMAC? ()
第7题:
With PGP, which of the following entity signs a users’s public key?()
第8题:
在直接通信方式中,系统提供的发送原语是()。
第9题:
The sender of the message.
The receipient of the message.
The sender’s administrator who provides the sender with the PGP program.
A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.
The vendor of the PGP program.
第10题:
Satellite clock
Ship's speed
Atmospheric/ionospheric propagation
Receiver
第11题:
第12题:
decrypts the received MAC using a secret key
compares the computed MAC vs. the MAC received
authenticate the receivedmessage using the sender’s public key
look up the sender’s public key
extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
Computes the MAC using the receivedmessage and a secret key as inputs to the hash function
第13题:
在直接通信方式中,系统提供的发送原语是
A.send(receiver,message)
B.send(sender,message)
C.send(sender,receiver)
D.send(receiver,sender)
第14题:
A. prevent the leakage of external fiber emissions
B. provide the optical network with the highest level of security possible
C. assure an even distribution of 1‘s and 0‘s for extended transmitter life
D. assure an adequate number of transitions for clock recovery at the receiver
E. prevent the receiver from assuming AIS inadvertently when all 0‘s are received
第15题:
What does not contribute to the commercial GPS receiver position error ________.
A.Satellite clock
B.Ship's speed
C.Atmospheric/ionospheric propagation
D.Receiver
第16题:
第17题:
第18题:
Scrambling of SONET signals is done to ().
第19题:
Which two statements are true about TCP communication?()
第20题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第21题:
prevent the leakage of external fiber emissions
provide the optical network with the highest level of security possible
assure an even distribution of 1's and 0's for extended transmitter life
assure an adequate number of transitions for clock recovery at the receiver
prevent the receiver from assuming AIS inadvertently when all 0's are received
第22题:
The receiver acknowledges the final packet in each communications stream.
The receiver adds sequencing numbers to the packets received.
The sender adds sequencing numbers to the packets it sends.
The receiver acknowledges each packet it receives from the sending device.
第23题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions