在线男人天堂|韩国三级电影未删减版|色戒未删完整版西瓜影音|亚洲一二三四,一路向西粤语在线观看完整版电影,伊人网站在线观看,成人免费观看高清视频

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 網(wǎng)絡(luò)工程師題庫 >> 試題查看
試卷名稱
考試中心《》在線考試
試卷年份2016年下半年
試題題型【單選題】
試題內(nèi)容

All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography  B.decode    C.privacy        D .security
(72)A. Conduction   B.confidence  C.confidentiality  D .connection
(73) A. Authentication B.structure    C.encryption    D.exchange
(74) A. Algorithm     B. Secure     C.structure     D.encryption
(75) A. Confidentiality  B. integrity   C.service       D.robustness

查看答案

相關(guān)試題



更多試題