CCIE系列认证

单选题Birthday attacks are used against which of the following?()Adigital signaturesBsymmetric cipheringChashalgoritmsDasymmetric cipheringEdigital certificates

题目
单选题
Birthday attacks are used against which of the following?()
A

 digital signatures

B

 symmetric ciphering

C

 hashalgoritms

D

 asymmetric ciphering

E

 digital certificates

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第2题:

The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()

  • A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
  • B、 Port scanners are the most effective defense against dynamic ARP inspection.
  • C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
  • D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
  • E、 DHCP snooping sends unauthorized replies to DHCP queries.
  • F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
  • G、 None of the other alternatives apply.

正确答案:A

第3题:

Which of the following is "承兑交单"?

A、Bill of exchange

B、Document against acceptance

C、Statement

D、Cost price


正确答案:B

第4题:

Observe the following options carefully, which two attacks focus on RSA? ()

  • A、BPA attack
  • B、Adaptive chosen ciphertext attack
  • C、DDoS attack
  • D、Man-in-the-middle attack

正确答案:A,B

第5题:

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()

  • A、Security Center
  • B、Event Viewer Security log
  • C、Windows Defender
  • D、Windows Firewall

正确答案:A

第6题:

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

A.Update antivirus definitions

B.MAC filtering

C.Effective security policies

D.User awareness training


参考答案:D

第7题:

Which of the following statements that describe Diffie Hellman Key exchange are correct? ()

  • A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.
  • B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.
  • C、 The DH exchange is susceptible to man-in-the-middle attacks.
  • D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.
  • E、A DH exchange provides Perfect Forward Secrecy (PFS).

正确答案:A,B,C,E

第8题:

Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()

A. 1 and 11

B. 2 and 10

C. 6 and 1

D. 6 and 11


参考答案:A

第9题:

Birthday attacks are used against which of the following?()

  • A、 digital signatures
  • B、 symmetric ciphering
  • C、 hashalgoritms
  • D、 asymmetric ciphering
  • E、 digital certificates

正确答案:C

第10题:

Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()

  • A、1 and 11
  • B、2 and 10
  • C、6 and 1
  • D、6 and 11

正确答案:A

更多相关问题