All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography B.decode C.privacy D .security
(72)A. Conduction B.confidence C.confidentiality D .connection
(73) A. Authentication B.structure C.encryption D.exchange
(74) A. Algorithm B. Secure C.structure D.encryption
(75) A. Confidentiality B. integrity C.service D.robustness
在網(wǎng)絡(luò)設(shè)計和實施過程中要采取多種安仝措施,下面的選項中屬于系統(tǒng)安全需求措施的是(68) 。
A.設(shè)備防雷擊
B.入侵檢測
C.漏洞發(fā)現(xiàn)與補丁管理
D.流量控制
在網(wǎng)絡(luò)的分層設(shè)計模型中,對核心層工作規(guī)程的建議是(69) 。
A.要進行數(shù)據(jù)壓縮以提高鏈路利用率
B.盡量避免使用訪問控制列表以減少轉(zhuǎn)發(fā)延遲
C.可以允許最終用戶直接訪問
D.盡量避免冗余連接
在網(wǎng)絡(luò)規(guī)劃和設(shè)計過程中,選擇網(wǎng)絡(luò)技術(shù)時要考慮多種因素。下面的各種考慮中不正確的是(70) 。
A.網(wǎng)絡(luò)帶寬要保證用戶能夠快速訪問網(wǎng)絡(luò)資源
B.要選擇具有前瞻性的網(wǎng)絡(luò)新技術(shù)
C.選擇網(wǎng)絡(luò)技術(shù)時要考慮未來網(wǎng)絡(luò)擴充的需要
D.通過投入產(chǎn)出分析確定使用何種技術(shù)