首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards t
Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards t
admin
2015-05-18
34
问题
Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards the gates to Hades.The name is apt because Kerberos is a(2)process,depending on a thrid—party service called the(3)to verify one computer’S identity to another and to set up (4) for a secure connection between them.Basically,Kerberos works because each computer shares a secret with the KDC,which has two components:a Kerberos authentication server and a (5)server.If a KDC doesn’t know the requested target server,it refers the authentication transaction to(6)that does.Kerberos is a network(7)protocol that allows one computer to(8)its identity to another across an insecure network through an exchange of encrypted messages.Once identity is verified,kerberos provides the two computer with (9) for a secure communication session.Kerberos authenticates the identity and encrypts their communications through (10).
(8)
选项
A、control
B、prove
C、ignore
D、transfer
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/8NJZ777K
本试题收录于:
网络工程师上午基础知识考试题库软考中级分类
0
网络工程师上午基础知识考试
软考中级
相关试题推荐
反映网络时代规律之一的麦特卡夫定律是指__________。
阅读下列说明和表,回答下列问题,将解答填入答题纸的对应栏内。【说明】看门狗(Watchdog)技术是嵌入式系统设计中保证系统可靠的常用技术。嵌入式控制系统运行时由于受到外部干扰或者内部系统错误,程序有时会出现“跑飞”现象,导致整个系统瘫痪。为了
Traditional Internet access methods like dial-up were so slow that host computers were connected to the dial-up(71)at the custom
Inthefollowing,whichisnotamethodforinter-processcommunication?().
Kerberos系统中可通过在报文中加入(7)________来防止重放攻击。
阅读下列说明,回答问题1至问题3。[说明]在JPEG静态图像压缩标准中采用了8×8大小子块的二维离散余弦变换(DiscreteCosineTransform,DCT)。DCT变换是正交变换的一种。变换编码并不直接对空域图像信号进行编码,而是首
TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define th
网络负载平衡(NetworkLoadBalancing)的核心是位于网络适配器驱动和(1)之间的WLBS.SYS的筛选器驱动。它采用一种(2),根据传入客户端的(3),以统计方式将其映射到群集主机。当发现到达的数据包时,所有主机同时执行这种映射,以快速
DES加密算法采用的密码技术是(61),它采用(62)bit密钥对传输的数据进行加密。著名的网络安全系统Kerberos采用的是(63)加密技术,公钥密码是(64),常用的公钥加密算法有(65),它可以实现加密和数字签名。
(56)is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(57)i
随机试题
银基钎料主要是()的合金。
建国以来我们在社会主义建设中所经历的曲折和失误,归根结底,就在于没有完全搞清楚()
水泥按其物化性质属于().
A公司为支付货款,向B公司签发了一张金额为200万元的银行承兑汇票,某商业银行作为承兑人在票面上签章。B公司收到汇票后将其背书转让给C公司,以偿还所欠C公司的租金,但未在被背书人栏内记载C公司的名称。C公司欠D公司一笔应付账款,遂直接将D公司记载为B公司的
若该企业2015年第二季度产量同比增长降低至8%,环比增长速度为20%,则2015年第一季度的产量为()万吨。
下列关于缓刑的表述,正确的有()。
求微分方程y"+y'-2y=xex+sin2x的通解.
设个体域为整数集,下列公式中其值为1的是(61)。
Thehotelprovidesfreeshuttle______tothetrainstationandtheairport.
Inthisageofthekeyboard,somepeopleseemtothinkhandwritinglessonsare______.
最新回复
(
0
)