山东建筑大学网络工程12级信息安全期末复习资料

上传人:第*** 文档编号:61463879 上传时间:2018-12-02 格式:DOC 页数:21 大小:78.01KB
返回 下载 相关 举报
山东建筑大学网络工程12级信息安全期末复习资料_第1页
第1页 / 共21页
山东建筑大学网络工程12级信息安全期末复习资料_第2页
第2页 / 共21页
山东建筑大学网络工程12级信息安全期末复习资料_第3页
第3页 / 共21页
山东建筑大学网络工程12级信息安全期末复习资料_第4页
第4页 / 共21页
山东建筑大学网络工程12级信息安全期末复习资料_第5页
第5页 / 共21页
点击查看更多>>
资源描述

《山东建筑大学网络工程12级信息安全期末复习资料》由会员分享,可在线阅读,更多相关《山东建筑大学网络工程12级信息安全期末复习资料(21页珍藏版)》请在金锄头文库上搜索。

1、山东建筑大学 网络工程12级 信息安全期末复习资料1. Which of the following is a kind of passive attack? A(a) The release of message contents(b) Replay(c) Modification of messages(d) Denial of service2. Which of the following is a primary method to illegally capture user sensitive information such as user passwords on a net

2、work? C(a) Spamming(b) Spoofing (c) Sniffing (d) Smirking3. Which of the following is not an asymmetric algorithm? D(a) RSA(b)Diffie-Hellman(c) DSS(d) DES4. Triple Data Encryption Standard (DES) (three keys) is a method of encryption. What is the key size for triple DES encrypted data?D(a) 64 bits(b

3、) 128 bits(c) 160 bits(d) 168 bits5. In public key cryptography, which key does the sender use to generate a signature?(a) Recipients public key(b) Recipients private key(c) Senders public key(d) Senders private key 6. What substantiates(证实) that a users claimed identity is valid and is normally app

4、lied through a user password at time of logon? B(a) Integrity(b) Authentication(c) Identification(d) Confidentiality7. Which of the following types of malicious code is often not parasitic(寄生虫)?B(a)Virus病毒(b)Trap door(c)Trojan Horse木马(d)Worm蠕虫8. The technique that each plaintext block is XORed with

5、the previous ciphertext block before being encrypted is called :B P50(a) Electronic Codebook(b) Cipher Block Chaining(c) Cipher Feedback(d) Round Function9. Proxy server is: B(a) Packet filter (b) Application-Level gateway(c) Circuit gateway(d) Stateful Inspection Firewalls10. Which approach is an a

6、pplication-specific security services that embedded within the particular application? B(a) IPSec(b) SSL(c) SET(d) TLSA _ layer security protocol provides end-to-end securityservices for applications. DA) data linkB) networkC) transportD) none of the above_ is actually an IETF version of _CA) TLS; T

7、SSB) SSL; TLSC) TLS; SSLD) SSL; SLTA SYN flood is an example of what type of attack? BA) Malicious codeB) Denial-of-serviceC) Man-in-the-middleD) SpoofingAn attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something such as a user

8、 IDand password combination, is known as: CA) A man-in-the-middle attackB) A denial-of-service attackC) A sniffing attackD) A backdoor attackIn what type of attack does an attacker resend the series of commands and codes used in a financial transaction to cause the transaction to beconducted multipl

9、e times?A) SpoofingB) Man-in-the-middleC) ReplayD) BackdoorA piece of malicious code that must attach itself to another file to replicate itself is known as:A) A wormB) A virusC) A logic bombD) A Trojan9 A piece of malicious code that appears to be designed to do one thing (and may in fact do that t

10、hing) but that hides some other payload (oftenmalicious) is known as:A) A wormB) A virusC) A logic bombD) A TrojanMalicious code that is set to execute its payload on a specific date or at a specific time is known as:A) A logic bombB) A Trojan horseC) A virusD) A time bombWhen a message is sent, no

11、matter what its format, why do we care about its integrity?A) To ensure proper formattingB) To show that the encryption keys are undamagedC) To show that the message has not been edited in transitD) To show that no one has viewed the messageIf a message has a hash, how does the hash protect the mess

12、age in transit?A) If the message is edited, the hash will no longer match.B) Hashing destroys the message so that it cannot be read by anyone.C) Hashing encrypts the message so that only the private key holder can read it.D) The hash makes the message uneditable.What is the biggest drawback to symme

13、tric encryption?A) It is too easily broken.B) It is too slow to be easily used on mobile devices.C) It requires a key to be securely shared.D) It is available only on UNIX.What is Diffie-Hellman most commonly used for?A) Symmetric encryption key exchangeB) Signing digital contractsC) Secure e-mailD)

14、 Storing encrypted passwordsWhat is public key cryptography a more common name for?A) Asymmetric encryptionB) SHAC) An algorithm that is no longer secure against cryptanalysisD) AuthenticationHow many bits are in a block of the SHA-1 algorithm?A) 128B) 64C) 512D) 1024In what type of attack does an a

15、ttacker resend the series of commands and codes used in a financial transaction to cause the transaction to be conducted multiple times?A) Spoofing B) Man-in-the-middleC) Replay D) BackdoorA piece of malicious code that must attach itself to another file to replicate itself is known as:A) A worm B) A virusC) A logic bomb D) A TrojanWhen a message is sent, no matter what its format, why do we care about its integrity?A)

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 规章制度

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号