digital signatures
symmetric ciphering
hashalgoritms
asymmetric ciphering
digital certificates
第1题:
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
第2题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第3题:
Which of the following is "承兑交单"?
A、Bill of exchange
B、Document against acceptance
C、Statement
D、Cost price
第4题:
Observe the following options carefully, which two attacks focus on RSA? ()
第5题:
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()
第6题:
A.Update antivirus definitions
B.MAC filtering
C.Effective security policies
D.User awareness training
第7题:
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()
第8题:
A. 1 and 11
B. 2 and 10
C. 6 and 1
D. 6 and 11
第9题:
Birthday attacks are used against which of the following?()
第10题:
Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()