午夜无码中文字幕影院,国产自产第一区c国产,久久久久久夜精品精品免费,国产99久久,夜夜夜夜曰天天天天拍国产,欧美日韩亚洲另类专区,国产精品区一区二区免费

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 網(wǎng)絡(luò)工程師題庫 >> 試題查看
試卷名稱
考試中心《》在線考試
試卷年份2016年下半年
試題題型【單選題】
試題內(nèi)容

All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography  B.decode    C.privacy        D .security
(72)A. Conduction   B.confidence  C.confidentiality  D .connection
(73) A. Authentication B.structure    C.encryption    D.exchange
(74) A. Algorithm     B. Secure     C.structure     D.encryption
(75) A. Confidentiality  B. integrity   C.service       D.robustness

查看答案

相關(guān)試題



更多試題