CMS专题

多选题Asymmetric and symmetric ciphers differ in which of the following way(s)? ()AAsymmetric ciphers use pre-shared keysBSymmetric ciphers are faster to computeCAsymmetric ciphers are faster to computeDAsymmetric ciphers use public and private

题目
多选题
Asymmetric and symmetric ciphers differ in which of the following way(s)? ()
A

Asymmetric ciphers use pre-shared keys

B

Symmetric ciphers are faster to compute

C

Asymmetric ciphers are faster to compute

D

Asymmetric ciphers use public and private

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The RSA algorithm is an example of what type of cryptography?RSA算法是下面哪种算法的典型例子?()

  • A、Private Key.私钥
  • B、Symmetric Key对称密钥
  • C、Secret Key秘密密钥
  • D、Asymmetric Key.非对称密钥

正确答案:D

第2题:

Asymmetric and symmetric ciphers differ in which of the following way(s)? () 

  • A、Asymmetric ciphers use pre-shared keys
  • B、Symmetric ciphers are faster to compute
  • C、Asymmetric ciphers are faster to compute
  • D、Asymmetric ciphers use public and private

正确答案:B,D

第3题:

In the following kinds of graphs, which one's adjacency matrix is symmetric?

A.Directed graph

B.Undirected graph

C.AOV network

D.AOE network


正确答案:B

第4题:

Which of the following statements is correct regarding a hybridcrypto system?()

  • A、 uses symmetric crypto for keys distribution
  • B、 uses symmetric crypto for proof of origin
  • C、 uses symmetric crypto for fast encrypted/decryption
  • D、 uses asymmetric crypto for message confidentiality
  • E、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

正确答案:C

第5题:

Which ones are the two type of ciphers?()

  • A、 Blocking cipher andnon-blocking cipher
  • B、 CBC cipher and EBC cipher
  • C、 Block cipher and Stream cipher
  • D、 Blocker cipher and Streamer cipher
  • E、 3DES cipher and AES cipher

正确答案:C

第6题:

Which three are distinctions between asymmetric and symmetric algorithms? ()

  • A、Only symmetric algorithms have a key exchange technology built in
  • B、Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
  • C、Only asymmetric algorithms have a key exchange technology built in
  • D、Asymmetric algorithms are based on more complex mathematical computations

正确答案:B,C,D

第7题:

Which one of the following potential issues is eliminated by using split horizon?()

  • A、Joined horizons
  • B、Packet forwarding loops
  • C、cisco Express Forwarding load-balancing inconsistency
  • D、Asymmetric routing throughout the network

正确答案:B

第8题:

Which encryption type is used to secure user data in an IPsec tunnel?()

A. symmetric key encryption

B. asymmetric key encryption

C. RSA

D. digital certificates


参考答案:A

第9题:

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

  • A、A session key value is exchanged across the network.
  • B、A session key never passes across the network.
  • C、A session key is used as the key for asymmetric data encryption.
  • D、A session key is used as the key for symmetric data encryption.

正确答案:B

第10题:

Which two of these correctly describe asymmetric routing and firewalls?()

  • A、only operational in routed mode
  • B、only operational in transparent mode
  • C、only eight interfaces can belong to an asymmetric routing group
  • D、operational in both failover and non-failover configurations
  • E、only operational when the firewall has been configured for failover

正确答案:C,D

更多相关问题