authorization
data integrity
confidentiality
authentication
第1题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第2题:
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.
A.Cryptography
B.decode
C.privacy
D.security@@@SXB@@@A.Conduction
B.confidence
C.confidentiality
D.connection@@@SXB@@@A.Authentication
B.structure
C.encryption
D.exchange@@@SXB@@@A.Algorithm
B.Secure
C.structure
D.encryption@@@SXB@@@A.Confidentiality
B.integrity
C.service
D.robustness
第3题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第4题:
Which security mechanism is employed only on the server-side to limit access to resources or components?()
第5题:
Which option ensures that data is not modified in transit?()
第6题:
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
第7题:
A.CHAP uses a two-way handshake
B.CHAP authentication periodically occurs after link establishment
C.CHAP has no protection from playback attacks
D.CHAP authentication is performed only upon link establishment
E.CHAP uses a three-way handshake
F.CHAP authentication passwords are sent in plaintext
第8题:
A.authorization
B.dataintegrity
C.confidentiality
D.authentication
第9题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第10题:
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()