久久免费视频播放|色戒西瓜影音电影完整版|孤儿怨未删减完整版在线观看樱花影视|香港战役电影完整版在线看未删减,国产小视频你懂的,亚洲第一页在线观看,黄视频网站在线看

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 網(wǎng)絡(luò)工程師題庫 >> 試題查看
試卷名稱
考試中心《》在線考試
試卷年份2016年下半年
試題題型【單選題】
試題內(nèi)容

All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography  B.decode    C.privacy        D .security
(72)A. Conduction   B.confidence  C.confidentiality  D .connection
(73) A. Authentication B.structure    C.encryption    D.exchange
(74) A. Algorithm     B. Secure     C.structure     D.encryption
(75) A. Confidentiality  B. integrity   C.service       D.robustness

查看答案

相關(guān)試題



更多試題