全部科目 > 网络规划设计师 >
2014年下半年 上午试卷 综合知识
第 74 题
章/节 专业英语  
 
 
There are two general approaches to attacking a ( 71)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the (72 ) or even some sample plaintext-ciphertext pairs. This type of (73 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the (74 )-force attack, is to try every possible key on a piece of (75 ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
 
  A.  brute
 
  B.  perfect
 
  C.  atribute
 
  D.  research




 
 
相关试题     专业英语 

  第71题    2009年下半年  
The network layer provides services to the transport layer. It can be based on either (71) . In both cases, its main job is (72) packets from the sour..

  第75题    2022年下半年  
An advanced persistent threat (APT) is a covert(71)attack on a computer network where the attacker gains and maintains(72)access to the targeted n..

  第73题    2018年下半年  
Anytime a host or a router has an IP datagram to send to another host or router, it has the (71) address of the receiver. This address is obtained fro..




更多复习资料
请登录电脑版软考在线 www.rkpass.cn

京B2-20210865 | 京ICP备2020040059号-5
京公网安备 11010502032051号 | 营业执照
 Copyright ©2000-2025 All Rights Reserved
软考在线版权所有