单选题Birthday attacks are used against which of the following?()A digital signaturesB symmetric cipheringC hashalgoritmsD asymmetric cipheringE digital certificates
单选题
Birthday attacks are used against which of the following?()
A
digital signatures
B
symmetric ciphering
C
hashalgoritms
D
asymmetric ciphering
E
digital certificates
参考解析
解析:
暂无解析
相关考题:
Which of the following is "承兑交单"?A、Bill of exchangeB、Document against acceptanceC、StatementD、Cost price
Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?() A. 1 and 11B. 2 and 10C. 6 and 1D. 6 and 11
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.C、 The DH exchange is susceptible to man-in-the-middle attacks.D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.E、A DH exchange provides Perfect Forward Secrecy (PFS).
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall
Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A、1 and 11B、2 and 10C、6 and 1D、6 and 11
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing
Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning
A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
单选题Birthday attacks are used against which of the following?()A digital signaturesB symmetric cipheringC hashalgoritmsD asymmetric cipheringE digital certificates
单选题Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A1 and 11B2 and 10C6 and 1D6 and 11
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training
单选题A computer’s case fan protects against which of the following environmental concerns?()APressureBHeatCBrown outDCold
单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()AwdadmBmrgpwdCmakedbmDmkpasswd
单选题The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B Port scanners are the most effective defense against dynamic ARP inspection.C MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E DHCP snooping sends unauthorized replies to DHCP queries.F ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G None of the other alternatives apply.
单选题Client exclusion policies are used to mitigate which of the following attacks?()AdictionaryBbit-flip and replayCmac spoofingDman-in-the-middle
单选题Which of the following chemicals will be used where protection against caustic cracking is required in boiler treatment?()ASodium hydroxideBSodium carbonateCSodium nitrateDSodium polyphosphate
多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits
多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.