考题云-WellCMS
  •  首页
  •  外语
  •  计算机
  •  考研
  •  公务员
  •  职业资格
  •  财经
  •  工程
  •  司法
  •  医学
  •  专升本
  •  自考
  •  实用职业技能
  •  登录
  1. 标签
  2. CISSP认证
  • There are several different modes that block ciphers can work in. Which mode does the graphic that follows portray?

    CISSP认证
    admin2013-12-19
    350
  • There are different ways of providing integrity and authentication within cryptography. What type of technology is shown in the

    CISSP认证
    admin2013-12-19
    720
  • There are several different types of important architectures within public key infrastructures. Which architecture does the grap

    CISSP认证
    admin2013-12-19
    220
  • There are several different types of technologies within cryptography that provide confidentiality. What is represented in the g

    CISSP认证
    admin2013-12-19
    490
  • What do the SA values in the graphic of IPSec that follows represent?

    CISSP认证
    admin2013-12-19
    330
  • End-to-end encryption is used by users, and link encryption is used by service providers. Which of the following correctly descr

    CISSP认证
    admin2013-12-19
    960
  • The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?

    CISSP认证
    admin2013-12-19
    260
  • SSL is a de facto protocol used for securing transactions that occur over untrusted networks. Which of the following best descri

    CISSP认证
    admin2013-12-19
    920
  • Advanced Encryption Standard is an algorithm used for which of the following?

    CISSP认证
    admin2013-12-19
    560
  • In cryptography, different steps and algorithms provide different types of security services. Which of the following provides on

    CISSP认证
    admin2013-12-19
    710
  • Which of the following best describes how a digital signature is created?

    CISSP认证
    admin2013-12-19
    620
  • There are two main types of symmetric ciphers: stream and block. Which of the following is not an attribute of a good stream cip

    CISSP认证
    admin2013-12-19
    420
  • Which of the following works similarly to stream ciphers?

    CISSP认证
    admin2013-12-19
    810
  • Mandy needs to calculate how many keys must be generated for the 260 employees using the company’s PKI asymmetric algorithm. How

    CISSP认证
    admin2013-12-19
    560
  • Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of sec

    CISSP认证
    admin2013-12-19
    650
  • If implemented properly, a one-time pad is a perfect encryption scheme. Which of the following incorrectly describes a requireme

    CISSP认证
    admin2013-12-19
    500
  • An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetric algorithms?

    CISSP认证
    admin2013-12-19
    480
  • Which of the following best describes Key Derivation Functions (KDFs)?

    CISSP认证
    admin2013-12-19
    430
  • Which of the following correctly describes the difference between public key cryptography and public key infrastructure?

    CISSP认证
    admin2013-12-19
    510
  • Encryption can happen at different layers of an operating system and network stack. Where does PPTP encryption take place?

    CISSP认证
    admin2013-12-19
    710
  • «
  • 1 ...
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...21
  • »
CopyRight © 2025 All Rights Reserved
Processed: 0.014, SQL: 5