单选题What is the MD5 algorithm used for?()Atakes a fixed-length message and produces a 128-bit message digestBtakes a variable-length message and produces a 168-bit message digestCtakes a message less than 2^64 bits as input and produces a 160-bit message digestDtakes a variable-length message and produces a 128-bit message digest ActualTests.com

单选题
What is the MD5 algorithm used for?()
A

takes a fixed-length message and produces a 128-bit message digest

B

takes a variable-length message and produces a 168-bit message digest

C

takes a message less than 2^64 bits as input and produces a 160-bit message digest

D

takes a variable-length message and produces a 128-bit message digest ActualTests.com


参考解析

解析: 暂无解析

相关考题:

●There are many page replacement algorithms in the page management.Most frequently used algorithm is (69) .(69) A.FIFOB.LRUC.OPTD.PPT

Most frequently used algorithm for page replacement isA.LRUB.FIFOC.OPTD.PPT

Most frequently used algorithm for page replacement isA. LRUB.FIFOC.OPTD.PPT

There are many page replacement algorithms in the page management. Most frequently used algorithm isA.FIFOB.PPTC.OPTD.LRU

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company‘s chief scientist has just improved the performance of one of the utility classes‘ key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class‘s API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class‘s API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly.What design flaw is most likely the cause of these new bugs?()A.InheritanceB.Tight couplingC.Low cohesionD.High cohesionE.Loose couplingF.Object immutability

What is the purpose of the magic number in an LCP negotiation?() A.It is used to detect loops.B.It is an interface identifier.C.It selects a compression algorithm.D.It specifies the transmission media.

The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?() A. direct modeB. round robinC. weighted round robinD. No algorithm is used.

The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A、HMAC-SHAB、HMAC-MD5C、CBC-DESD、AESE、3DES

在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。A、encapsulation-mode tunnelB、transform espC、esp encryption-algorithm desD、esp encryption-algorithm 3desE、esp authentication-algorithm md5

为用户添加EVDO-Algorithm属性,属性值选则CAVE-BASE将导致用户无法通过MD5鉴权。

What are three benefits of GLBP?()A、GLBP supports up to eight virtual forwarders per GLBP groupB、GLBP supports clear text and MD5 password authentication between GLBP group membersC、GLBP is an open source standardized protocol that can be used with multiple vendorsD、GLBP supports up to 1024 virtual routersE、GLBP can load share traffic across a maximum of four routersF、GLBP elects two AVGs and two standby AVGs for redundancy

In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.

What is the MD5 algorithm used for?()A、takes a fixed-length message and produces a 128-bit message digestB、takes a variable-length message and produces a 168-bit message digestC、takes a message less than 2^64 bits as input and produces a 160-bit message digestD、takes a variable-length message and produces a 128-bit message digest ActualTests.com

Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.

The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.

What is the purpose of the magic number in an LCP negotiation?()A、It is used to detect loops.B、It is an interface identifier.C、It selects a compression algorithm.D、It specifies the transmission media.

You want to use RMAN to create compressed backups.  Which statement is true about the compression algorithms that RMAN can use?()A、 The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、 The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、 The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、 Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()A、 algorithm = failoverB、 algorithm = round_robinC、 reserve_policy = no_reserveD、 reserve_policy = single_path

多选题Which of the following statements about MD5 Routing Updates authentication is valid? ()AThe MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hashBThe MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hashCMultiple keys are supportedDRouting updates packets are delivered in encrypted messagesEShared secret keys are delivered in encrypted messages

单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES

单选题What is the purpose of the magic number in an LCP negotiation?()AIt is used to detect loops.BIt is an interface identifier.CIt selects a compression algorithm.DIt specifies the transmission media.

单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose coupling

单选题When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()A algorithm = failoverB algorithm = round_robinC reserve_policy = no_reserveD reserve_policy = single_path

单选题You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()AThe BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.BThe ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.CThe ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.DOnly the BZIP2 compression algorithm can be used to make compressed backups to disk.

单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose couplingFObject immutability

单选题The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()Adirect modeBround robinCweighted round robinDNo algorithm is used.

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.