摘要:对于【网络工程师】软考考试而言,试题无疑是最重要的学习资料之一。在软考备考过程中,吃透试题、掌握试题所考知识点、熟悉试题的出题思路,对我们提升分数的效果是最明显的,通过对试题的反复练习,还可以查漏补缺。今天,给大家带来【2016年11月 网络工程师 上午题】部分试题的详解,一起来看看吧~



1、 All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(本题)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
A、 Authentication
B、 structure

C、 encryption
D、 exchange


答案:D
答题解析:



2、 All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(本题)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.
A、 Algorithm
B、 Secure

C、 structure
D、 encryption


答案:A
答题解析:



3、 All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(本题)and identity of peers during transport over insecure channels.
A、 Confidentiality
B、 integrity

C、 service
D、 robustness


答案:B
答题解析:



查看完整试题>>>