免费智能真题库 > 历年试卷 > 网络规划设计师 > 2014年下半年 网络规划设计师 上午试卷 综合知识
  第71题      
  章/节:   专业英语       

 
There are two general approaches to attacking a ( 71)encryption scheme.The first attack is known as cryptanalysis.Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the (72 ) or even some sample plaintext-ciphertext pairs. This type of (73 ) exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised. The second method, known as the (74 )-force attack, is to try every possible key on a piece of (75 ) until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
 
 
  A.  stream
 
  B.  symmetric
 
  C.  asymmetric
 
  D.  advanced
 
 
 

  相关试题:专业英语          更多>  
 
  第75题    2012年下半年  
   56%
BGP is an inter-autonomous system routing protocol; it is designed to be used between multiple autonomous (71).BGP ..
  第71题    2012年下半年  
   55%
BGP is an inter-autonomous system routing protocol; it is designed to be used between multiple autonomous (71).BGP ..
  第71题    2025年下半年  
   0%
An advanced persistent threat (APT) is a covert(71)attack on a computer network where the attacker gains and maintains..
   题号导航      2014年下半年 网络规划设计师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第71题    在手机中做本题