多选题Which of the following statements are true? ()ARC4 is a stream cipherBStream ciphers require paddingCAES is a block cipherDDES and 3DES are stream ciphersEAES is a stream cipherFAES, DES, and 3DES can be used as HMAC algorithms

多选题
Which of the following statements are true? ()
A

RC4 is a stream cipher

B

Stream ciphers require padding

C

AES is a block cipher

D

DES and 3DES are stream ciphers

E

AES is a stream cipher

F

AES, DES, and 3DES can be used as HMAC algorithms


参考解析

解析: 暂无解析

相关考题:

下列选项中,属于MediaPlayer支持的音频类型的是()。 A.AudioManager.STREAM_MUSICB.AudioManager.STREAM_RINGC.AudioManager.STREAM_ALARMD.AudioManager.STREAM_NOTIFICTION

Which three are true about MPLS LSP establishment using RSVP?() (Choose three.) A. Ordered ControlB. Independent ControlC. Down Stream UnsolicitedD. Liberal Label ManagementE. Down Stream On Demand

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.

Select the two correctstatements from the list below that describe DES and 3DES: ()A、 3DES is muchmore secure than DES.B、 Both DES and 3DES are stream ciphers.C、 DES uses 64 bitkeys, although the effective key lengthis only 56bits.D、 The decryption operation for both DES and 3DES is the same as the encryption operation.E、 DES can only be used for encryption, whereas 3DES can also be used for authentication.

IPSEC使用的加密算法有()A、DES、3DES、AESB、DES、3DESC、3DES、AESD、DES、AES

Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A、HMAC-SHAB、HMAC-MD5C、CBC-DESD、AESE、3DES

Which ones are the two type of ciphers?()A、 Blocking cipher andnon-blocking cipherB、 CBC cipher and EBC cipherC、 Block cipher and Stream cipherD、 Blocker cipher and Streamer cipherE、 3DES cipher and AES cipher

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)A、LDP uses Down Stream On Demand.B、RSVP uses Down Stream On Demand.C、LDP uses Down Stream Unsolicited.D、RSVP uses Down Stream Unsolicited.

Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)A、Ordered ControlB、Independent ControlC、Down Stream UnsolicitedD、Liberal Label ManagementE、Down Stream On Demand

Which of the following statements are true? ()A、 RC4 is a stream cipherB、 Stream ciphers require paddingC、 AES is a block cipherD、 DES and 3DES are stream ciphersE、 AES is a stream cipherF、 AES, DES, and 3DES can be used as HMAC algorithms

Stream ciphers run on which of the following?()A、Fixed-length groups of digits called blocksB、Individual blocks,one at a time,with the transformations varying during the encryptionC、Individual digits,one at a time,with the transformations varying during the encryptionD、Fixed-length groups of bits called blocks

Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice traffic.C、UDP is used to ensure a reliable transmission from sender to receiver.D、RTP is used to provide resource reservation for the voice stream.E、UDP provides multiplexing of multiple phone conversations.

Which of the following uses PKI?()A、BlowfishB、AESC、PGPD、3DES

Which of the following kdb subcommands should be entered to obtain information about a serial port?()A、 ttyB、 statC、 traceD、 stream

Which capability exists only in java.io.BufferedWriter?()A、Closing an open stream.B、Flushing an open stream.C、Writing to an open stream.D、Writing a line separator to an open stream.

You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()A、tcp Transport, windows Stream Security, transaction Flow, binary Message EncodingB、transaction Flow, binary Message Encoding, windows Stream Security, tcp TransportC、windows Stream Security, tcp Transport, binary Message Encoding, transaction FlowD、binary Message Encoding, transaction Flow, tcp Transport, windows Stream Security

单选题When fighting an oil or gasoline fire in the bilge,which of the following should NOT be used?()AFoamBSolid stream water nozzleCAll-purpose nozzleDCarbon dioxide

单选题Which of the following kdb subcommands should be entered to obtain information about a serial port?()A ttyB statC traceD stream

单选题When building the job stream MASTER#NEW_STREAM in the composer  command line, which option should be used to apply the settings in the  Variable Table "LIVE_VARS" to be associated to the  jobs in the job stream?()A AB BC CD D

单选题Which of the following statements regarding low expansion foam and its application is INCORRECT?().AFoam should not be used on electrical firesBOne kilo of low expansion foam solution produces much more foamCFoam is only efficient when it covers the top of burning combustiblesDA stream of foam should be deflected off the deck in order to best agitate the fire

多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

多选题Which two statements are true about the protocols that are used for transmitting voice traffic?()ARTP multiplexing is used to keep multiple phone conversations separateBRTP provides end-to-end delivery services for voice traffic.CUDP is used to ensure a reliable transmission from sender to receiver.DRTP is used to provide resource reservation for the voice stream.EUDP provides multiplexing of multiple phone conversations.

多选题Which of the following statements are true? ()ARC4 is a stream cipherBStream ciphers require paddingCAES is a block cipherDDES and 3DES are stream ciphersEAES is a stream cipherFAES, DES, and 3DES can be used as HMAC algorithms

多选题Select the two correctstatements from the list below that describe DES and 3DES: ()A3DES is muchmore secure than DES.BBoth DES and 3DES are stream ciphers.CDES uses 64 bitkeys, although the effective key lengthis only 56bits.DThe decryption operation for both DES and 3DES is the same as the encryption operation.EDES can only be used for encryption, whereas 3DES can also be used for authentication.

单选题Which ones are the two type of ciphers?()A Blocking cipher andnon-blocking cipherB CBC cipher and EBC cipherC Block cipher and Stream cipherD Blocker cipher and Streamer cipherE 3DES cipher and AES cipher

多选题Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)AOrdered ControlBIndependent ControlCDown Stream UnsolicitedDLiberal Label ManagementEDown Stream On Demand

单选题Which retrieves the binary input stream on line 13?()A  request.get Writer ():B  request.get Reader ():C  request.get Input Stream():D  request.get Resource As Stream():E  request.get Resource As Stream (Servlet Request. REQUEST):

多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.