The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第1题:
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
第2题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第3题:
A. The transparent encryption of backups uses the encryption wallet
B. The database uses the same encryption key for every encrypted backup
C. The password encryption of backups only uses the password while creating and restoring backup
D. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第4题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第5题:
Which statement is true about a certificate authority?()
第6题:
A. A session key value is exchanged across the network.
B. A session key never passes across the network.
C. A session key is used as the key for asymmetric data encryption.
D. A session key is used as the key for symmetric data encryption.
第7题:
第8题:
A. The transparent encryption of backups uses the encryption wallet
B. The database uses the same encryption key for every encrypted backup
C. The password encryption of backups only uses the password while creating and restoring backup
D. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第9题:
What is the objective of Diffie-Hellman?()
第10题:
Which description about asymmetric encryption algorithms is correct?()