软题库 学习课程
当前位置:信管网 >> 在线考试中心 >> 信息安全工程师题库 >> 试题查看
试卷年份2022年下半年
试题题型【单选题】
试题内容

Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash


查看答案

相关试题

68题: 交换机是构成网络的基础设备,主要功能是负责网络通信数据包的交换传输。其中工作于 OSI 的数据链路层,能够识别数据中的 MAC,并根据 MAC 地址选择转发端口的是()
A.第一代交换机
B.第二代交换机
C.第三代交换机
D.第四代交换机
答案解析与讨论:www.cnitpm.com/st/57414167.html

69题: 以下不属于网络设备提供的 SNMP 访问控制措施的是( )。
A.SNMP权限分级机制
B.限制 SNMP 访问的IP 地址
C.SNMP 访问认证
D.关闭 SNMP 访问
答案解析与讨论:www.cnitpm.com/st/5741518043.html

70题: 网络设备的常见漏洞包括拒绝服务漏洞、旁路、代码执行、溢出、内存破坏等。CVE-2000-0945信息显示思科 Catalyst 3500 XL 交换机的Web 配置接口允许远程攻击者不需要认证就执行命令,该漏洞属于( )。
A.拒绝服务漏洞
B.旁路
C.代码执行
D.内存破坏
答案解析与讨论:www.cnitpm.com/st/5741620645.html