provide AES encryption key support to LTO-3, LTO-4 and LTO-5 tape drives
provide AES encryption key support for DS5000 storage arrays
provide encryption key management forStorwize V7000, LTO-4, and LTO-5 tape drives
provide encryption key management forStorwize V7000, TS1120 and TS1130 tape drives
第1题:
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.
A.Cryptography
B.decode
C.privacy
D.security@@@SXB@@@A.Conduction
B.confidence
C.confidentiality
D.connection@@@SXB@@@A.Authentication
B.structure
C.encryption
D.exchange@@@SXB@@@A.Algorithm
B.Secure
C.structure
D.encryption@@@SXB@@@A.Confidentiality
B.integrity
C.service
D.robustness
第2题:
第3题:
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
第4题:
第5题:
第6题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第7题:
第8题:
A. A session key value is exchanged across the network.
B. A session key never passes across the network.
C. A session key is used as the key for asymmetric data encryption.
D. A session key is used as the key for symmetric data encryption.
第9题:
第10题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()