免费智能真题库 > 历年试卷 > 网络规划设计师 > 2014年下半年 网络规划设计师 上午试卷 综合知识
  第75题      
  章/节:   专业英语       

 
There are two general approaches to attacking a ( 71)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the (72 ) or even some sample plaintext-ciphertext pairs. This type of (73 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the (74 )-force attack, is to try every possible key on a piece of (75 ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
 
 
  A.  plaintext
 
  B.  ciphertext
 
  C.  sample
 
  D.  code
 
 
 

 
  第72题    2018年下半年  
   53%
Anytime a host or a router has an IP datagram to send to another host or router, it has the (71) address of the receiver..
  第74题    2009年下半年  
   60%
The network layer provides services to the transport layer. It can be based on either (71) . In both cases, its main job..
  第75题    2016年下半年  
   60%
The diffserv approach to providing QoS in networks employs a small, well-defined set of building blocks from which you c..
   题号导航      2014年下半年 网络规划设计师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第75题    在手机中做本题