Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1
Which algorithm was the first to be found suitable for both digital signing and encryption?()
- A、HMAC
- B、RSA
- C、MD5
- D、SHA-1
相关考题:
Which routing select algorithm is described below ? According to a kind of fix regulation, the select algorithm of route works and has nothing to do with the network information newly.A.Static Routing AlgorithmB.Dynamic Routing AlgorithmC.Centralized Routing AlgorithmD.Distributed Routing Algorithm
Which routing algorithm is described below?It is a mechanism in which the sending station determines the route the frame. will follow andincludes the routing information with the flame;bridges read the routing information to determineif they should forward the frame.A.Fixed RoutingB.Spanning TreeC.Source RoutingD.Frame. Forwarding
M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure
There are two common types in page replacement algorithm : stack and non-stack strategies.When a real page number increase only stack algorithm can increase the hit rate monotonously.In the following replacement algorithm, which one belongs to non-stack strategyA.FIFOB.LRUC.OPTD.non of above
The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?() A. direct modeB. round robinC. weighted round robinD. No algorithm is used.
Which RADIUS configuration command implements a primary/backup scenario for multiple servers?() A.radius algorithm directB.radius algorithm backupC.radius algorithm primaryD.radius algorithm round-robin
Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?() A. RIPB. IPX RIPC. IGRPD. OSPFE. IS-IS
Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP
The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.
You want to use RMAN to create compressed backups. Which statement is true about the compression algorithms that RMAN can use?()A、 The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、 The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、 The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、 Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
多选题Which of the following statements about MD5 Routing Updates authentication is valid? ()AThe MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hashBThe MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hashCMultiple keys are supportedDRouting updates packets are delivered in encrypted messagesEShared secret keys are delivered in encrypted messages
多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP
单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES
单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters: The byte array to be decrypted, which is named cipherMessage The key, which is named key An initialization vector, which is named iv You need to decrypt the message by using the TripleDES class and place the result in a string. Which code segment should you use?()A AB BC CD D
单选题Which one of the following is NOT a supported IKE attribute?()A PFS group.B Encryption algorithm.C Hashing Algorithm.D Authenticationmethod.E Lifetime duration.
单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()AMicrosoft ClusteringBMicrosoft Decision TreeCMicrosoft Nave BayesDMicrosoft Association
单选题What is the function of the CSMA/CD algorithm in Ethernet technologies?()Adefines how the media is accessedBsupplies a token to determine which host has access to the mediaCdefines the encoding of electrical signals on the wireDdetermines the preamble bits
多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
单选题Which algorithm was the first to be found suitable for both digital signing and encryption?()AHMACBRSACMD5DSHA-1
多选题Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?()ARIPBIPX RIPCIGRPDOSPFEIS-IS
单选题You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()AThe BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.BThe ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.CThe ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.DOnly the BZIP2 compression algorithm can be used to make compressed backups to disk.
单选题According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()ALevel 1 internal routesBLevel 1 external routesCLevel 2 internal routesDLevel 2 external routes
单选题Which is a step in the JUNOS software CSPF algorithm?()APrune links that are bidirectional.BEliminate paths with insufficient MTUCEliminate paths of more than 15 hops.DPrune links that do not contain the included administrative group.
单选题Which RADIUS configuration command implements a primary/backup scenario for multiple servers?()Aradius algorithm directBradius algorithm backupCradius algorithm primaryDradius algorithm round-robin
单选题Which command displays the number of times that the OSPF Shortest Path First (SPF) algorithm has been executed?()Ashow ip protocolBshow ip ospfCsho w ip ospf databaseDshow ip ospf interface
单选题The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()Adirect modeBround robinCweighted round robinDNo algorithm is used.