多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
多选题
Which two statements regarding symmetric key encryption are true?() (Choose two.)
A
The same key is used for encryption and decryption.
B
It is commonly used to create digital certificate signatures.
C
It uses two keys: one for encryption and a different key for decryption.
D
An attacker can decrypt data if the attacker captures the key used for encryption.
参考解析
解析:
暂无解析
相关考题:
Which two statements are true about encrypting RMAN backup?() A. The transparent encryption of backups uses the encryption walletB. The database uses the same encryption key for every encrypted backupC. The password encryption of backups only uses the password while creating and restoring backupD. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
Which two statements are true about encrypting RMAN backup?() (Choose two.) A. The transparent encryption of backups uses the encryption walletB. The database uses the same encryption key for every encrypted backupC. The password encryption of backups only uses the password while creating and restoring backupD. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?() A. A session key value is exchanged across the network.B. A session key never passes across the network.C. A session key is used as the key for asymmetric data encryption.D. A session key is used as the key for symmetric data encryption.
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the senders private key to encrypt some portion of the message. When the message is received, the receiver uses the senders ( ) key tp decipher the digital signature to verify the senders identity.A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。 A. interpretationB.signaturesC. encryptionD.decryption
Which statement is true about a certificate authority?()A、An entity responsible for registering the private key encryption used in a PKIB、An agency responsible for granting and revoking public-private key pairsC、A trusted third party responsible for signing the public keys of entities in a PKIbased systemD、A trusted third party responsible for signing the private keys of entities in a PKIbased system
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates
Which two statements regarding symmetric key encryption are true?() (Choose two.)A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption.
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
Which two statements regarding asymmetric key encryption are true?() (Choose two.)A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption.
Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()AA session key value is exchanged across the network.BA session key never passes across the network.CA session key is used as the key for asymmetric data encryption.DA session key is used as the key for symmetric data encryption.
多选题Which two statements regarding asymmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
单选题Which description about asymmetric encryption algorithms is correct?()AThey use the same key for encryption and decryption of data.BThey use different keys for decryption but the same key for encryption of data.CThey use different keys for encryption and decryption of data.DThey use the same key for decryption but different keys for encryption of data.
多选题Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()Athe two methods of authentication using the WEP encryption are open and shared keyBthe 802.11 standard defines WEP security using 128-bit keysCWEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTDWEP is a scalable encryption solution that uses static keys for authenticationEWEP security provides only one-way authenticationFWEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
多选题Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。AIt specifies use of a static encryption key that must be changed frequently to enhance securityBIt requires use of an open authentication methodCIt specifies the use of dynamic encryption keys that change each time a client establishes a connectionDIt requires that all access points and wireless devices use the same encryption keyEIt includes authentication by PSK