单选题Birthday attacks are used against which of the following?()A digital signaturesB symmetric cipheringC hashalgoritmsD asymmetric cipheringE digital certificates

单选题
Birthday attacks are used against which of the following?()
A

 digital signatures

B

 symmetric ciphering

C

 hashalgoritms

D

 asymmetric ciphering

E

 digital certificates


参考解析

解析: 暂无解析

相关考题:

Which of the following is "承兑交单"?A、Bill of exchangeB、Document against acceptanceC、StatementD、Cost price

Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?() A. 1 and 11B. 2 and 10C. 6 and 1D. 6 and 11

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

Which of the following statements that describe Diffie Hellman Key exchange are correct? ()A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.C、 The DH exchange is susceptible to man-in-the-middle attacks.D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.E、A DH exchange provides Perfect Forward Secrecy (PFS).

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates

Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A、1 and 11B、2 and 10C、6 and 1D、6 and 11

Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing

Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT

Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning

A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

单选题Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A1 and 11B2 and 10C6 and 1D6 and 11

单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training

单选题Which of the following is primarily used for VoIP?()ATLSBRDFCNTPDRTP

单选题A computer’s case fan protects against which of the following environmental concerns?()APressureBHeatCBrown outDCold

单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()AwdadmBmrgpwdCmakedbmDmkpasswd

单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B Port scanners are the most effective defense against dynamic ARP inspection.C MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E DHCP snooping sends unauthorized replies to DHCP queries.F ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G None of the other alternatives apply.

单选题Client exclusion policies are used to mitigate which of the following attacks?()AdictionaryBbit-flip and replayCmac spoofingDman-in-the-middle

单选题Which of the following chemicals will be used where protection against caustic cracking is required in boiler treatment?()ASodium hydroxideBSodium carbonateCSodium nitrateDSodium polyphosphate

多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits

多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.