首页 网络工程师正文

Allthreetypesofcryptograph(2016年下半年网络工程师上午综合知识真题解析)

All three types of cryptography schemes have unique function mapping to specific.For example, the synunetric key(71) approach is typically used for theencryption of data providmg(72), whereas asymmetric key cryptography is maidy used in key(73)and noruepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides messageintegrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
(71) A. Cryptography  B.decode    C.privacy        D .security
(72)A. Conduction   B.confidence  C.confidentiality  D .connection
(73) A. Authentication B.structure    C.encryption    D.exchange
(74) A. Algorithm     B. Secure     C.structure     D.encryption
(75) A. Confidentiality  B. integrity   C.service       D.robustness






答案: A、C、C、A、A
参考解析:正在整理中,欢迎在文下评论区提供答案解析,谢谢!
版权声明

本文仅代表作者观点,不代表本站立场。
本文系作者授权发表,未经许可,不得转载。

本文链接:https://scpro.cn/v/62ff43f8b82411ee.html

最近发表