色综合成人,苹果电影完整版在线观看未删减港,推拿电影未删减完整版在线观看,成人男女视频网站,特洛伊战争电影完整版未删减 ,91九色丨porny丨交换,无间电视剧在线观看免费完整版

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 網(wǎng)絡(luò)工程師題庫 >> 試題查看
試卷名稱
考試中心《》在線考試
試卷年份2016年下半年
試題題型【單選題】
試題內(nèi)容

All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography  B.decode    C.privacy        D .security
(72)A. Conduction   B.confidence  C.confidentiality  D .connection
(73) A. Authentication B.structure    C.encryption    D.exchange
(74) A. Algorithm     B. Secure     C.structure     D.encryption
(75) A. Confidentiality  B. integrity   C.service       D.robustness

查看答案

相關(guān)試題



更多試題