There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.(1)处应选________. A. streamB.symmetricC. asymmetricD.advanced

There are two general approaches to attacking a (1)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

(1)处应选________.


A. stream
B.symmetric
C. asymmetric
D.advanced

参考解析

解析:

相关考题:

●Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(71) A.vulnerableB.weekC.sensitivelyD.helpless(72) A.reliableB.secureC.indestructibleD.steady(73) A.visitB.accessC.I/OD.read/write(74) A.powerB.rightsC.authorizedD.common(75) A.searchedB.checkedC.testedD.detected

Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.A.vulnerableB.weekC.sensitivelyD.helpless

Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing(73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(77)A.vulnerableB.weekC.helplessD.sensitively

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.A.stream B.symmetric C.asymmetric D.advancedA.operation B.publication C.plaintext D.ciphertextA.message B.knowledge C.algorithm D.attackA.brute B.perfect C.atribue D.re searchA.plaintext B.ciphertext C.sample D.code

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the senders private key to encrypt some portion of the message. When the message is received, the receiver uses the senders ( ) key tp decipher the digital signature to verify the senders identity.A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private

Which two wireless encryption methods are based on the RC4 encryption algorithm?() A.WEPB.CCKMC.AESD.TKIPE.CCMP

材料:Following a general average incident,ship agents and surveyors play a significant role.A ship agent,in addition to the normal duties of port and husbandry agency,will assist the master in the aftermath of a general average incident to make a declaration which complies with the local law and custom of the port.Once the average adjuster has confirmed that security has been obtained from all the interested parties,the agent is instructed by the ship owner to permit delivery of the cargo.If cargo has been discharged to lighten the vessel,or cargo has been transshipped to a final destination,the agent will be responsible for keeping full and complete records of all movements and expenditure attributable to the general average.After any incident,a large number of surveyors representing various interests will descend on the vessel.Some of these surveyors will not be involved directly in the general average process.However,if it has become necessary to sacrifice or discharge a part of the cargo before arrival at the final destination stated on the bill of lading,the ship owner will appoint surveyors to report on the condition and quantity of cargo.Such surveyors,usually called general average surveyors,will act in the interests of all the parties involved(and may also represent hull and machinery interests).If possible,the account representing expenditure incurred should be examined and approved by the general average surveyor before settlement.问题:Which of the following is NOT correct as to the general average surveyors ___________.A.They may sometimes be involved into the examination and approval of general average expendituresB.They may sometimes be involved into the examination and approval of general average sacrificesC.They will act in the interests of all the parties involvedD.They will look at particularly the general average mattersWhat does this passage imply for the shipmasters when a general average incident occurred onboard ___________.A.He can rely on greatly the general average surveyorsB.He can rely on greatly the ship agentC.He can rely on greatly the interested partiesD.He can rely on greatly other surveyorsThe ship agent mentioned in the passage behaves ______.A.for the benefit of the cargo ownerB.for the benefit of the shipownerC.for the benefit of the salvorsD.for the benefit of the interested parties other than the aboveThe security required by the owner of ship and provided by relevant interested parties in general average cases is for the purpose of _______.① contributing to the losses and damages of general average nature;② securing all the general average contributions;③ Securing all the payment of Sue and Labour;④ contributing to the losses and damages of particular average nature.A.①③④B.①②③C.①②D.②③④请帮忙给出每个问题的正确答案和分析,谢谢!

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。 A. interpretationB.signaturesC. encryptionD.decryption

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( 4 )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.(4)处应选_______. A. bruteB. perfectC. atribueD. research

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext-ciphertext pairs. This type of (请作答此空 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success. A. messageB. knowledgeC. algorithmD. attack

There are two general approaches to attacking a ( )encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the ( ) or even some sample plaintext- ciphertext pairs. This type of ( 3 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the ( )-force attack, is to try every possible key on a piece of ( ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.(3)应选__________. A. messageB. knowledge C. algorithm D.attack

Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()A、 BPII B、 SPII-Plus C、 FPII D、 EPII-Plus E、 HPII F、 HPII-PIus

在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。A、encapsulation-mode tunnelB、transform espC、esp encryption-algorithm desD、esp encryption-algorithm 3desE、esp authentication-algorithm md5

Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

单选题When two fire hose teams are attacking a fire they should().Ause different fire hose pressuresBuse fire hoses of different sizesCnot attack the fire from opposite sidesDnot wear protective clothing

单选题Which algorithm was the first to be found suitable for both digital signing and encryption?()AHMACBRSACMD5DSHA-1

单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()AThese attacks send multiple FIN segments forcing TCP connection release.BThese attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.CThese attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.DThese attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.EThese attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.