The RSA algorithm is an example of what type of cryptography

题目
单选题
The RSA algorithm is an example of what type of cryptography?RSA算法是下面哪种算法的典型例子?()
A

Private Key.私钥

B

Symmetric Key对称密钥

C

Secret Key秘密密钥

D

Asymmetric Key.非对称密钥

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What is the type and scope of the LSA required to support traffic engineering in an OSPFenvironment?()

A. Type 9, AS scope

B. Type 10, AS scope

C. Type 10, Area scope

D. Type 9, Area scope


参考答案:C

第2题:

All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

A. Cryptography
B.decode
C.privacy
D.security

答案:A
解析:

第3题:

听力原文:M: Can you give an example of types of risks Banks face?

W: Yes. The major type of risks is called credit risk. It means a counterpart fails to perform. according to a contractual arrangement.

Q: What are they talking about?

(13)

A.A contractual arrangement.

B.A counterpart.

C.Many types of risks.

D.Credit risk.


正确答案:D
解析:他们在谈论银行所面临的风险,女士说“The major type of risks is called credit risk.”,所以D选项符合题意。

第4题:

(71)is the science of hiding information。Whereas the goal of cryptography is to make data unreadable by a third party。the goal of steganography is to hide the data from a third party。In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software。

  There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spy movies),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication。With computers and networks,there are many other ways of hiding informations,such as:

  Covert channels(c,g,Loki and some distributed denial-of-service tools use the Internet Control(3)Protocol,or ICMP,as the communication channel between the“bad guy”and a compromicyed system)

  Hidden text within Web pages

  Hiding files in“plain sight”(c,g,what better place to“hide”a file than with an important sounding name in the c:\winnt system32 directory)

  Null ciphers(c,g,using the first letter of each word to form a hidden message in an otherwise innocuous text)

  steganography today,however,is significantly more(4)than the example about suggest,allowing a user to hide large amounts of information within image and audio。These forms of steganography often are used in conjunction with cryptography so the information is double protected;first it is encrypted and then hidden so that an advertisement first。find the information(an often difficult task in and of itself)and the decrypted it。

  The simplest approach to hiding data within an image file is called(5)signature insertion。In this method ,we can take the binary representation of the hidden data and the bit of each byte within the covert image。If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye。

(71)处的单词应是

A.Cryptography
B.Geography
C.Stenography
D.Steganography

答案:A
解析:
该段译文如下:
信息隐藏学是隐藏信息的科学。而密码学的目的是让数据对于第三方不可识别,而信息隐藏学的目的则是将数据对于第三方隐藏起来。本文,我将论述信息隐藏学是什么、它的目的是什么,并且会提供使用可行软件的案例。
有许多信息隐藏的方法实际上我们都很熟悉(特别是如果你看过一些谍战片!),从隐型墨水和微小的点点,到将信息暗含在一大段文字的每个单词的第二个字母中,还有无线通信中的扩频技术等等。使用计算机和网络,有许多其他的隐藏信息的方法,比如:
转换信道(e.g.,洛基和一些分布式拒绝服务工具使用网际控制管理协议,或叫做icmp,作为“坏人”和受攻击的系统之间的通信信道)
隐藏信息在网页中
隐藏文件在“眼皮儿底下”(比如,隐藏信息在什么地方比给它取一个重要的熟悉名字放置在目录C:\winnt\system32中更好?)
空域算法(比如,使用一段毫不相干的文字中每个单词的首写字母来表示一个隐藏的信息)
隐写术在今天,然而明显比上面的例子更强大,允许用户隐藏大量的信息在图像和音频文件,这些形式的隐写术通常用于结合密码学,信息是双重保护的。
最简单的方法来隐藏数据,是将信息嵌入在图像文件的像素位上(lsb),在这种方法中,我们可以把隐藏的二进制表示数据和覆盖的每个字节的图片,如果我们使用的是24位颜色,数量的变化是最小的并且肉眼是看不见的。

第5题:

All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash(本题)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.

A.Algorithm
B.Secure
C.structure
D.encryption

答案:A
解析:

第6题:

A Cisco router has been configured with the following command:IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0his is an example of what type of NAT?()

A. Static NAT

B. Dynamic NAT

C. Dynamic NAT with overload

D. Port Address Translation

E. None of the above


参考答案:B

第7题:

All three types of cryptography schemes have unique function mapping to specific.For example,the synunetric key(71)approach is typically used for theencryption of data providmg(72),whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation,thereby providing confidentiality and authentication.The hash(74)(noncryptic),on the other hand,does not provide confidentiality but provides messageintegrity,and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
请作答72题。

A.Conduction
B.confidence
C.confidentiality
D.connection

答案:C
解析:

第8题:

YouneedtocreateaJavaBeanobjectthatisusedonlywithinthecurrentJSPpage.ItmustNOTbeaccessibletoanyotherpageincludingthosethatthispagemightimport.WhichJSPstandardactioncanaccomplishthisgoal?()

A.<jsp:useBeanid=’pageBean’type=’com.example.MyBean’/>

B.<jsp:useBeanid=’pageBean’class=’com.example.MyBean’/>

C.<jsp:makeBeanid=’pageBean’type=’com.example.MyBean’/>

D.<jsp:makeBeanid=’pageBean’class=’com.example.MyBean’/>


参考答案:B

第9题:

All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

A.Algorithm
B.Secure
C.structure
D.encryption

答案:A
解析:

第10题:

The DES algorithm is an example of what type of cryptography?DES算法是下面哪一个加密算法的一个样例?()

  • A、Secre tKey.秘密密钥
  • B、Asymmetric Key.非对称密钥
  • C、Two-key双密钥
  • D、Public Key.公钥

正确答案:A

更多相关问题