PKCS #7
PKCS #8
PKCS #10
PKCS #12
第1题:
A. UNIQUE
B. NOT NULL
C. CHECK
D. PRIMARY KEY
E. FOREIGN KEY
第2题:
A.FQDN
B.DNS name
C.Public key
D.Private key
第3题:
Which of the following plays a key role in body growth according to the text?
[A] Genetic modification.
[B] Natural environment.
[C] Living standards.
[D] Daily exercise.
从第三段“but as diet and health improved, children and adolescents have increased in height by…..”可以看出生活水平对于身体成长起着非常重要的作用;另外,A,B,D选项所涉及的genetic modification ,natural environment 和daily exercise文中并没有提到;
第4题:
Which statement is true about a certificate authority?()
第5题:
A.PKCS#7
B.PKCS#8
C.PKCS#10
D.PKCS#12
第6题:
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.
A.binarytext
B.hypertext
C.plaintext
D.supertext
第7题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第8题:
Which of the following plays a key role in body growth according to the text?
A.Genetic modification.
B.Natural environment.
C.Living standards.
D.Daily exercise.
第9题:
第10题:
Which Public Key Cryptographic Standards (PKCS) defines the syntax for encrypted messages andmessages with digital signatures?()