网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which algorithm was the first to be found suitable for both digital signing and encryption?()

  • A、HMAC
  • B、RSA
  • C、MD5
  • D、SHA-1

参考答案

更多 “Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1” 相关考题
考题 Which routing select algorithm is described below ? According to a kind of fix regulation, the select algorithm of route works and has nothing to do with the network information newly.A.Static Routing AlgorithmB.Dynamic Routing AlgorithmC.Centralized Routing AlgorithmD.Distributed Routing Algorithm

考题 Which routing algorithm is described below?It is a mechanism in which the sending station determines the route the frame. will follow andincludes the routing information with the flame;bridges read the routing information to determineif they should forward the frame.A.Fixed RoutingB.Spanning TreeC.Source RoutingD.Frame. Forwarding

考题 M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure

考题 There are two common types in page replacement algorithm : stack and non-stack strategies.When a real page number increase only stack algorithm can increase the hit rate monotonously.In the following replacement algorithm, which one belongs to non-stack strategyA.FIFOB.LRUC.OPTD.non of above

考题 The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?() A. direct modeB. round robinC. weighted round robinD. No algorithm is used.

考题 Which RADIUS configuration command implements a primary/backup scenario for multiple servers?() A.radius algorithm directB.radius algorithm backupC.radius algorithm primaryD.radius algorithm round-robin

考题 Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?() A. RIPB. IPX RIPC. IGRPD. OSPFE. IS-IS

考题 Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

考题 Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

考题 The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.

考题 You want to use RMAN to create compressed backups.  Which statement is true about the compression algorithms that RMAN can use?()A、 The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、 The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、 The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、 Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

考题 多选题Which of the following statements about MD5 Routing Updates authentication is valid? ()AThe MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hashBThe MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hashCMultiple keys are supportedDRouting updates packets are delivered in encrypted messagesEShared secret keys are delivered in encrypted messages

考题 多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

考题 单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A HMAC-SHAB HMAC-MD5C CBC-DESD AESE 3DES

考题 单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()A AB BC CD D

考题 单选题Which one of the following is NOT a supported IKE attribute?()A  PFS group.B  Encryption algorithm.C  Hashing Algorithm.D  Authenticationmethod.E  Lifetime duration.

考题 单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()A Microsoft ClusteringB Microsoft Decision TreeC Microsoft Nave BayesD Microsoft Association

考题 单选题What is the function of the CSMA/CD algorithm in Ethernet technologies?()A defines how the media is accessedB supplies a token to determine which host has access to the mediaC defines the encoding of electrical signals on the wireD determines the preamble bits

考题 多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 单选题Which algorithm was the first to be found suitable for both digital signing and encryption?()A HMACB RSAC MD5D SHA-1

考题 多选题Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?()ARIPBIPX RIPCIGRPDOSPFEIS-IS

考题 单选题You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()A The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

考题 单选题According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()A Level 1 internal routesB Level 1 external routesC Level 2 internal routesD Level 2 external routes

考题 单选题Which is a step in the JUNOS software CSPF algorithm?()A Prune links that are bidirectional.B Eliminate paths with insufficient MTUC Eliminate paths of more than 15 hops.D Prune links that do not contain the included administrative group.

考题 单选题Which RADIUS configuration command implements a primary/backup scenario for multiple servers?()A radius algorithm directB radius algorithm backupC radius algorithm primaryD radius algorithm round-robin

考题 单选题Which command displays the number of times that the OSPF Shortest Path First (SPF) algorithm has been executed?()A show ip protocolB show ip ospfC sho w ip ospf databaseD show ip ospf interface

考题 单选题The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A direct modeB round robinC weighted round robinD No algorithm is used.