网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which statement is true about a certificate authority?()
- A、An entity responsible for registering the private key encryption used in a PKI
- B、An agency responsible for granting and revoking public-private key pairs
- C、A trusted third party responsible for signing the public keys of entities in a PKIbased system
- D、A trusted third party responsible for signing the private keys of entities in a PKIbased system
参考答案
更多 “Which statement is true about a certificate authority?()A、An entity responsible for registering the private key encryption used in a PKIB、An agency responsible for granting and revoking public-private key pairsC、A trusted third party responsible for signing the public keys of entities in a PKIbased systemD、A trusted third party responsible for signing the private keys of entities in a PKIbased system” 相关考题
考题
Evaluate the following SQL statement used to create the PRODUCTS table:Which statement is true regarding this command?()
A. It executes successfully but partition pruning cannot happen for this partition key.B. It produces an error because the TOTAL_VALUE column cannot be used as a partition key.C. It produces an error because compression cannot be used for the TOTAL_VALUE partition key.D. It executes successfully but the values in the TOTAL_VALUE column would not be physically stored in the partitions.
考题
Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates
考题
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
A. A session key value is exchanged across the network.B. A session key never passes across the network.C. A session key is used as the key for asymmetric data encryption.D. A session key is used as the key for symmetric data encryption.
考题
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the senders private key to encrypt some portion of the message. When the message is received, the receiver uses the senders ( ) key tp decipher the digital signature to verify the senders identity.A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
考题
If the redelivery of a vessel is delayed by causes ______,hire is payable at the charter rate until redelivery even though the market rate may have gone up or down.A.for which neither party is responsibleB.for which the owner is responsibleC.for which either party is responsibleD.for which the charterer is responsible
考题
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。
A. interpretation
B.signatures
C. encryption
D.decryption
考题
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's (_______) key tp decipher the digital signature to verify the sender's identity.
横线处应选( )。
A. plain
B. cipher
C.public
D.private
考题
Which of the following is NOT related to a Public key infrastructure (PKI)?以下哪个概念与公钥基础设施(PKI)无关?()A、A X.509 certificate(X.509证书)B、A Ticket Granting Service(票据授予服务)C、A Registration authority(注册机构)D、A Certificate authority(证书机构)
考题
With PGP, which of the following entity signs a users’s public key?()A、 The sender of the message.B、 The receipient of the message.C、 The sender’s administrator who provides the sender with the PGP program.D、 A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.E、 The vendor of the PGP program.
考题
In a Windows Server 2003 environment using PKI, a user encrypts several documents on a shared file server. That user account is then accidentally deleted. Which of the following must be configured inorder to decrypt those files?()A、 Key recovery administratorB、 Key recovery agentC、 Trusted root certificate storeD、 Root certificate store
考题
Which Oracle background process is responsible for providing information about the instance name associated with the service handlers and services to the listener?()A、PMONB、SMONC、LGWRD、CKRT
考题
大副负责整个甲板部的维修保养工作。()A、The chief officer is responsible for the overall maintenance of the deck department.B、The second officer is responsible for the overall cleaning of the deck department.C、The third officer is responsible for the overall maintenance of the deck department.D、The chief officer is responsible for the overall cleaning of the deck department.
考题
Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.
考题
Which statements about the garbage collection are true?() A、 The program developer must create a thread to be responsible for free the memory.B、 The garbage collection will check for and free memory no longer needed.C、 The garbage collection allow the program developer to explicity and immediately free the memory.D、 The garbage collection can free the memory used java object at expect time.
考题
Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates
考题
Which two statements regarding symmetric key encryption are true?() (Choose two.)A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption.
考题
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
考题
Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
考题
单选题()is the united nations agency responsible for the Radio Regulations among other things.A
ITUB
IMOC
MSCD
WMO
考题
单选题Which of the following is NOT related to a Public key infrastructure (PKI)?以下哪个概念与公钥基础设施(PKI)无关?()A
A X.509 certificate(X.509证书)B
A Ticket Granting Service(票据授予服务)C
A Registration authority(注册机构)D
A Certificate authority(证书机构)
考题
单选题With PGP, which of the following entity signs a users’s public key?()A
The sender of the message.B
The receipient of the message.C
The sender’s administrator who provides the sender with the PGP program.D
A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.E
The vendor of the PGP program.
考题
单选题大副负责整个甲板部的维修保养工作。()A
The chief officer is responsible for the overall maintenance of the deck department.B
The second officer is responsible for the overall cleaning of the deck department.C
The third officer is responsible for the overall maintenance of the deck department.D
The chief officer is responsible for the overall cleaning of the deck department.
考题
单选题Which statement is true about a certificate authority?()A
An entity responsible for registering the private key encryption used in a PKIB
An agency responsible for granting and revoking public-private key pairsC
A trusted third party responsible for signing the public keys of entities in a PKIbased systemD
A trusted third party responsible for signing the private keys of entities in a PKIbased system
考题
单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()A
ECPB
IRQC
AGPD
TPM
考题
单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A
A session key value is exchanged across the network.B
A session key never passes across the network.C
A session key is used as the key for asymmetric data encryption.D
A session key is used as the key for symmetric data encryption.
考题
单选题Which description about asymmetric encryption algorithms is correct?()A
They use the same key for encryption and decryption of data.B
They use different keys for decryption but the same key for encryption of data.C
They use different keys for encryption and decryption of data.D
They use the same key for decryption but different keys for encryption of data.
考题
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
热门标签
最新试卷