全部科目 > 网络工程师 >
2016年下半年 上午试卷 综合知识
第 75 题
章/节 计算机专业英语  
 
 
All three types of cryptography schemes have unique function mapping to specific applications.For example, the symmetric key(71) approach is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is mainly used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
 
  A.  confidentiality
 
  B.  integrity
 
  C.  service
 
  D.  robustness
 
 




 
 
相关试题     计算机专业英语 

  第74题    2017年下半年  
routing in circuit-switching networks has traditionally involved a static routing strategy with the use of(71)paths to respond to increased load . modern routing strategies provi..

  第71题    2014年上半年  
The traditional way of allocating a single channel among multiple competing users is to chop up its (71) by using one of the multiplexing schemes such as FDM (Frequency Division Mu..

  第72题    2011年下半年  
A transport layer protocol usually has several responsibilities. One is to create a process-to-process communication; UDP uses (71) numbers to accomplish this. Another responsibili..




更多复习资料
请登录电脑版软考在线 www.rkpass.cn

京B2-20210865 | 京ICP备2020040059号-5
京公网安备 11010502032051号 | 营业执照
 Copyright ©2000-2023 All Rights Reserved
软考在线版权所有