Which description about asymmetric encryption algorithms is 

题目
单选题
Which description about asymmetric encryption algorithms is correct?()
A

They use the same key for encryption and decryption of data.

B

They use different keys for decryption but the same key for encryption of data.

C

They use different keys for encryption and decryption of data.

D

They use the same key for decryption but different keys for encryption of data.

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The description about the murderer was pretty vague.

A:imprecise
B:concise
C:unpolished
D:elementary

答案:A
解析:
本句意思:对那个凶手的描述十分的模糊。imprecise的意思为“不准确的,有差池的”; concise的意思为“简洁的,简明的”; unpolished的意思为“未擦拭的,未经修饰的”; elementary的 意思为“基础的”。vague的意思为“含糊的,模糊的”,可指话语的表述或事物轮廓的模糊,和 imprecise的意思接近。

第2题:

All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash(本题)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.

A.Algorithm
B.Secure
C.structure
D.encryption

答案:A
解析:

第3题:

Which encryption type is used to secure user data in an IPsec tunnel?()

A. symmetric key encryption

B. asymmetric key encryption

C. RSA

D. digital certificates


参考答案:A

第4题:

Asymmetric and symmetric ciphers differ in which of the following way(s)? () 

  • A、Asymmetric ciphers use pre-shared keys
  • B、Symmetric ciphers are faster to compute
  • C、Asymmetric ciphers are faster to compute
  • D、Asymmetric ciphers use public and private

正确答案:B,D

第5题:

All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

A.Authentication
B.structure
C.encryption
D.exchange

答案:D
解析:

第6题:

All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

A. Cryptography
B.decode
C.privacy
D.security

答案:A
解析:

第7题:

All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing(本题),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash( )(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.

A.Conduction
B.confidence
C.confidentiality
D.connection

答案:C
解析:

第8题:

All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.

A.Cryptography

B.decode

C.privacy

D.security@@@SXB@@@A.Conduction

B.confidence

C.confidentiality

D.connection@@@SXB@@@A.Authentication

B.structure

C.encryption

D.exchange@@@SXB@@@A.Algorithm

B.Secure

C.structure

D.encryption@@@SXB@@@A.Confidentiality

B.integrity

C.service

D.robustness


正确答案:D,C,C,A,C

第9题:

Which three are distinctions between asymmetric and symmetric algorithms? ()

  • A、Only symmetric algorithms have a key exchange technology built in
  • B、Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
  • C、Only asymmetric algorithms have a key exchange technology built in
  • D、Asymmetric algorithms are based on more complex mathematical computations

正确答案:B,C,D

第10题:

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

  • A、the two methods of authentication using the WEP encryption are open and shared key
  • B、the 802.11 standard defines WEP security using 128-bit keys
  • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
  • D、WEP is a scalable encryption solution that uses static keys for authentication
  • E、WEP security provides only one-way authentication
  • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

正确答案:A,E

更多相关问题