1、PKI中撤銷證書是通過維護(hù)一個(gè)證書撤銷列表CRL來(lái)實(shí)現(xiàn)的。以下不會(huì)導(dǎo)致證書被撤銷的是( )。
A.密鑰泄漏
B.系統(tǒng)升級(jí)
C.證書到期
D.從屬變更
查看答案
參考答案:B
2、 雜湊函數(shù)SHAI的輸入分組長(zhǎng)度為()比特
A、128
B、258
C、512
D、1024
查看答案
參考答案:C
3、 特洛伊木馬攻擊的威脅類型屬于()
A、授權(quán)侵犯威脅
B、滲入威脅
C、植入威脅
D、旁路控制威脅
查看答案
參考答案:C
4、 以下關(guān)于加密技術(shù)的敘述中,錯(cuò)誤的是()
A、對(duì)稱密碼體制的加密密鑰和解密密鑰是相同的
B、密碼分析的目的就是千方百計(jì)地尋找密鑰或明文
C、對(duì)稱密碼體制中加密算法和解密算法是保密的
D、所有的密鑰都有生存周期
查看答案
參考答案:C
5、下列關(guān)于公鑰體制中說(shuō)法不正確的是()
A.在一個(gè)公鑰體制中,一般存在公鑰和私鑰兩種密鑰
B.公鑰體制中僅根據(jù)加密密鑰來(lái)去確定解密密鑰在計(jì)算上是可行的
C.公鑰體制中的關(guān)于可以以明文方式發(fā)送
D.公鑰密碼中的私鑰可以用來(lái)進(jìn)行數(shù)字簽名
查看答案
參考答案:B
6、確保信息僅被合法實(shí)體訪問,而不被泄露給非授權(quán)的實(shí)體或供其利用的特性是指信息的( )。
A.完整性
B.可用性
C.保密性
D.不可抵賴性
查看答案
參考答案:C
7、 以下關(guān)于VPN的敘述中,正確的是()
A、VPN指的是用戶通過公用網(wǎng)絡(luò)建立的臨時(shí)的、安全的連接
B、VPN指的是用戶自己租用線路,和公共網(wǎng)絡(luò)物理上完全隔離的、安全的線路
C、VPN不能做到信息認(rèn)證和身份認(rèn)證
D、VPN只能提供身份認(rèn)證,不能提供數(shù)據(jù)加密的功能
查看答案
參考答案:A
8、IPSec協(xié)議可以為數(shù)據(jù)傳輸提供數(shù)據(jù)源驗(yàn)證、無(wú)連接數(shù)據(jù)完整性、數(shù)據(jù)機(jī)密性、抗重播等安全服務(wù)。其實(shí)現(xiàn)用戶認(rèn)證采用的協(xié)議是( )。
A. IKE協(xié)議
B. ESP協(xié)議
C. AH協(xié)議
D. SKIP協(xié)議
查看答案
參考答案:C
9、下面對(duì)國(guó)家秘密定級(jí)和范圍的描述中,不符合《中華人民共和國(guó)保守國(guó)家秘密法》要求的是( )。
A、對(duì)是否屬于國(guó)家和屬于何種密級(jí)不明確的事項(xiàng),可由各單位自行參考國(guó)家要求確定和定級(jí),然后報(bào)國(guó)家保密工作部門備案
B、各級(jí)國(guó)家機(jī)關(guān)、單位對(duì)所產(chǎn)生的秘密事項(xiàng),應(yīng)當(dāng)按照國(guó)家秘密及其密級(jí)的具體范圍的規(guī)定確定密級(jí),同時(shí)確定保密期限和知悉范圍
C、國(guó)家秘密及其密級(jí)的具體范圍,由國(guó)家行政管理部門]分別會(huì)同外交、公安、國(guó)家安全和其他中央有關(guān)機(jī)關(guān)規(guī)定
D、對(duì)是否屬于國(guó)家和屬于何種密級(jí)不明確的事項(xiàng),由國(guó)家保密行政管理部門,或省、自治區(qū)、直轄市的保密行政管理部門確定
查看答案
參考答案:A
10、The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
查看答案
參考答案:A、D、C、B、A
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評(píng)論 查看完整評(píng)論 | |