All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography B.decode C.privacy D .security
(72)A. Conduction B.confidence C.confidentiality D .connection
(73) A. Authentication B.structure C.encryption D.exchange
(74) A. Algorithm B. Secure C.structure D.encryption
(75) A. Confidentiality B. integrity C.service D.robustness
在網(wǎng)絡設計和實施過程中要采取多種安仝措施,下面的選項中屬于系統(tǒng)安全需求措施的是(68) 。
A.設備防雷擊
B.入侵檢測
C.漏洞發(fā)現(xiàn)與補丁管理
D.流量控制
在網(wǎng)絡的分層設計模型中,對核心層工作規(guī)程的建議是(69) 。
A.要進行數(shù)據(jù)壓縮以提高鏈路利用率
B.盡量避免使用訪問控制列表以減少轉發(fā)延遲
C.可以允許最終用戶直接訪問
D.盡量避免冗余連接
在網(wǎng)絡規(guī)劃和設計過程中,選擇網(wǎng)絡技術時要考慮多種因素。下面的各種考慮中不正確的是(70) 。
A.網(wǎng)絡帶寬要保證用戶能夠快速訪問網(wǎng)絡資源
B.要選擇具有前瞻性的網(wǎng)絡新技術
C.選擇網(wǎng)絡技術時要考慮未來網(wǎng)絡擴充的需要
D.通過投入產(chǎn)出分析確定使用何種技術