免费智能真题库 > 历年试卷 > 网络工程师 > 2016年下半年 网络工程师 上午试卷 综合知识
  第74题      
  章/节:   计算机专业英语       

 
All three types of cryptography schemes have unique function mapping to specific applications.For example, the symmetric key(71) approach is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is mainly used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
 
 
  A.  algorithm
 
  B.  secure
 
  C.  structure
 
  D.  encryption
 
 
 

 
  第74题    2019年下半年  
   47%
A virtual(71)network,or VPN, is an encrypted connection over the Internet from a device to a network.The encrypted conne..
  第72题    2022年下半年  
   54%
Network firewalls are security devices used to stolo or mitigate(71) access to private networks connected to the Interne..
  第73题    2014年上半年  
   56%
The traditional way of allocating a single channel among multiple competing users is to chop up its (71) by using one of..
   题号导航      2016年下半年 网络工程师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第74题    在手机中做本题