CMS专题

单选题Which of the following statements is correct regarding a hybridcrypto system?()Auses symmetric crypto for keys distributionBuses symmetric crypto for proof of originCuses symmetric crypto for fast encrypted/decryptionDuses asymmetric crypto for message

题目
单选题
Which of the following statements is correct regarding a hybridcrypto system?()
A

 uses symmetric crypto for keys distribution

B

 uses symmetric crypto for proof of origin

C

 uses symmetric crypto for fast encrypted/decryption

D

 uses asymmetric crypto for message confidentiality

E

 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following statements about ORACLE is (are) correct?

Ⅰ.ORACLE follows SQL standard

Ⅱ.ORACLE database defines two logical types: table and view

A.Ⅰonly

B.Ⅱ only

C.Ⅰ and Ⅱ

D.none of the above


正确答案:C

第2题:

Which two statements regarding JUNOS architecture are correct?()

A.The Routing Engine handles all exception traffic.

B.The Routing Engine synchronizes the route table with the PFE

C.The Routing Engine is hot-pluggable.

D.The Routing Engine controls the PFE


参考答案:C, D

第3题:

15 Which of the following statements about intangible assets are correct?

1 If certain criteria are met, research expenditure must be recognised as an intangible asset.

2 Goodwill may not be revalued upwards.

3 Internally generated goodwill should not be capitalised.

A 2 and 3 only

B 1 and 3 only

C 1 and 2 only

D All three statements are correct


正确答案:A

第4题:

Which of the following statements is true regarding the VERSIONS BETWEEN clause?()  

  • A、 The VERSIONS BETWEEN clause may be used in DML statements.
  • B、 The VERSIONS BETWEEN clause may be used in DDL statements.
  • C、 The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.
  • D、 The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

正确答案:C

第5题:

Which of the following is correct regarding full-state backups?()

  • A、used for either a single or dual UCS catastrophic failure
  • B、can be restored with no special requirements
  • C、stored as gzipped tarball
  • D、easy to modify as needed

正确答案:C

第6题:

Which of the following statements is correct regarding an oil with a high viscosity index?

A.A large change of viscosity occurs with a minor change in temperature

B.No change in viscosity occurs with any change in temperature

C.Very little change in viscosity occurs with a significant change in temperature

D.The viscosity of the oil increases with an increase in temperature


正确答案:C

第7题:

Which of the following statements is TRUE regarding crane operations ________.

A.Radio communications allow the crane operator to disregard the use of hand signals

B.The crane operators and signalman must be familiar with the correct hand signals

C.The forward cranes can be operated from the bridge

D.The aft cranes can be operated from the aft steering station


正确答案:B

第8题:

19 Which of the following statements about intangible assets in company financial statements are correct according

to international accounting standards?

1 Internally generated goodwill should not be capitalised.

2 Purchased goodwill should normally be amortised through the income statement.

3 Development expenditure must be capitalised if certain conditions are met.

A 1 and 3 only

B 1 and 2 only

C 2 and 3 only

D All three statements are correct


正确答案:A

第9题:

Which of the following statements regarding ISDN are correct?()

  • A、Each ISDN B channel has transmission speeds of up to 64 kbps.
  • B、The ISDN B channel can carry video, voice or data.
  • C、The ISDN B channel transmission rate varies depending on the service used.
  • D、The ISDN D channel transmits control information.
  • E、The ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured.

正确答案:A,B,D

第10题:

Which of the following statements is correct regarding a hybridcrypto system?()

  • A、 uses symmetric crypto for keys distribution
  • B、 uses symmetric crypto for proof of origin
  • C、 uses symmetric crypto for fast encrypted/decryption
  • D、 uses asymmetric crypto for message confidentiality
  • E、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

正确答案:C

更多相关问题