Multiple choice questions on network security deployment have the answer P6

In the current technology era, it is extremely necessary for anyone to be secure when accessing the network. In this test, Network Administrator will provide you with useful knowledge to ensure network security. Invite your reference.

  1. Question 1. What happens when a notice has been modified?
    1. The public key has been changed
    2. The personal key has been changed
    3. The digital message has been changed
    4. The message is properly encrypted
  2. Question 2. Which of the following is a development standard for creating secure messages?
    1. Data Encryption Standard
    2. Digital Signature Standard
    3. Secure Hash Algorithm
    4. Standard data signature
  3. Question 3. If the attacker stole a password containing one-way encrypted password, what kind of attack would she perform to find the encrypted password?
    1. Man-in-the-middle attack
    2. Attack on Birthday
    3. Denial of Service
    4. Attack Dictionary
  4. Question 4. What are the advantages of RSA compared to DSS?
    1. It can give digital signatures and coding functions
    2. It uses less resources and faster encryption because it uses symmetric keys
    3. It is a block cipher compared to a stream cipher
    4. It uses one-time encryption pad
  5. Question 5. What is used to create a digital signature?
    1. The recipient's private key
    2. The sender's public key
    3. Sender's private key
    4. The recipient's public key
  6. Question 6. Which of the following is the best way to describe an electronic signature?
    1. A method of transferring a handwritten signature to an electronic document
    2. A method of encrypting confidential information
    3. A method to provide an electronic signature and encryption
    4. A method for letting the recipients of the message prove the origin and integrity of a message
  7. Question 7. Using multiple bits with DES to be effective?
    1. 16
    2. 32
    3. 65
    4. 56
  8. Question 8. Factors affecting the encoding process
    1. Encryption, decoding algorithms, and safety of transmission channels
    2. Time for coding and decoding
    3. Perform block encryption, expand the number of bits to handle
    4. All is wrong
  9. Question 9. For packet filtering firewall, which of the following attacks is performed?
    1. Duplicate IP addresses, attack between, attack borders
    2. Duplicate IP addresses, attack source paths, attack small samples
    3. Duplicate IP addresses, attack through firewalls, attack small samples
    4. Duplicate IP addresses, attack through firewalls, attack source paths
  10. Question 10. Who is involved in the development of the first public key encryption system?
    1. Adi Shamir
    2. Ross Anderson
    3. Bruce Schneier
    4. Martin Hellman
Update 24 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile