Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1

Which algorithm was the first to be found suitable for both digital signing and encryption?()

  • A、HMAC
  • B、RSA
  • C、MD5
  • D、SHA-1

相关考题:

Which routing select algorithm is described below ? According to a kind of fix regulation, the select algorithm of route works and has nothing to do with the network information newly.A.Static Routing AlgorithmB.Dynamic Routing AlgorithmC.Centralized Routing AlgorithmD.Distributed Routing Algorithm

Which routing algorithm is described below?It is a mechanism in which the sending station determines the route the frame. will follow andincludes the routing information with the flame;bridges read the routing information to determineif they should forward the frame.A.Fixed RoutingB.Spanning TreeC.Source RoutingD.Frame. Forwarding

M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure

There are two common types in page replacement algorithm : stack and non-stack strategies.When a real page number increase only stack algorithm can increase the hit rate monotonously.In the following replacement algorithm, which one belongs to non-stack strategyA.FIFOB.LRUC.OPTD.non of above

The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?() A. direct modeB. round robinC. weighted round robinD. No algorithm is used.

Which RADIUS configuration command implements a primary/backup scenario for multiple servers?() A.radius algorithm directB.radius algorithm backupC.radius algorithm primaryD.radius algorithm round-robin

Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?() A. RIPB. IPX RIPC. IGRPD. OSPFE. IS-IS

Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.

You want to use RMAN to create compressed backups.  Which statement is true about the compression algorithms that RMAN can use?()A、 The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、 The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、 The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、 Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

多选题Which of the following statements about MD5 Routing Updates authentication is valid? ()AThe MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hashBThe MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hashCMultiple keys are supportedDRouting updates packets are delivered in encrypted messagesEShared secret keys are delivered in encrypted messages

多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES

单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()A AB BC CD D

单选题Which one of the following is NOT a supported IKE attribute?()A PFS group.B Encryption algorithm.C Hashing Algorithm.D Authenticationmethod.E Lifetime duration.

单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()AMicrosoft ClusteringBMicrosoft Decision TreeCMicrosoft Nave BayesDMicrosoft Association

单选题What is the function of the CSMA/CD algorithm in Ethernet technologies?()Adefines how the media is accessedBsupplies a token to determine which host has access to the mediaCdefines the encoding of electrical signals on the wireDdetermines the preamble bits

多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

单选题Which algorithm was the first to be found suitable for both digital signing and encryption?()AHMACBRSACMD5DSHA-1

多选题Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?()ARIPBIPX RIPCIGRPDOSPFEIS-IS

单选题You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()AThe BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.BThe ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.CThe ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.DOnly the BZIP2 compression algorithm can be used to make compressed backups to disk.

单选题According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()ALevel 1 internal routesBLevel 1 external routesCLevel 2 internal routesDLevel 2 external routes

单选题Which is a step in the JUNOS software CSPF algorithm?()APrune links that are bidirectional.BEliminate paths with insufficient MTUCEliminate paths of more than 15 hops.DPrune links that do not contain the included administrative group.

单选题Which RADIUS configuration command implements a primary/backup scenario for multiple servers?()Aradius algorithm directBradius algorithm backupCradius algorithm primaryDradius algorithm round-robin

单选题Which command displays the number of times that the OSPF Shortest Path First (SPF) algorithm has been executed?()Ashow ip protocolBshow ip ospfCsho w ip ospf databaseDshow ip ospf interface

单选题The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()Adirect modeBround robinCweighted round robinDNo algorithm is used.