mcq 队列_MCQ | 密码学基础

mcq 队列

1) Which of the following is not a type of symmetric-key cryptography technique?

1)以下哪一项不是对称密钥密码技术?

  1. Caesar cipher

    凯撒密码

  2. Data Encryption Standard (DES)

    数据加密标准(DES)

  3. Diffie Hellman cipher

    Diffie Hellman密码

  4. Playfair cipher

    公平游戏密码

Answer: c) Diffie Hellman cipher

答案: c)Diffie Hellman密码

Explanation:

说明:

The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest mentioned cipher techniques use the same key for encryption as well as decryption.

Diffie Hellman使用一对非对称密钥进行加密和解密过程。 其余所有提到的密码技术都使用相同的密钥进行加密和解密。



2) Which of the following is not a principle of data security?

2)以下哪一项不是数据安全性原则?

  1. Data Confidentiality

    资料保密

  2. Data Integrity

    数据的完整性

  3. Authentication

    认证方式

  4. None of the above

    以上都不是

Answer: d) None of the above

答案: d)以上都不是

Explanation:

说明:

All the first three options are the principles of data security. None of the mentioned characteristics fall apart form these principles. Therefore, the correct answer is none of the above.

前三个选项都是数据安全性的原则。 这些原则都没有脱离这些原则。 因此,正确的答案不是以上所有。



3) Which of the following security attacks is not an active attack?
OR
Which of the following attacks is a passive attack?

3)以下哪些安全攻击不是主动攻击?
要么
以下哪些攻击是被动攻击?

  1. Masquerade

    假面舞会

  2. Modification of message

    消息修改

  3. Denial of service

    拒绝服务

  4. Traffic analysis

    流量分析

Answer: d) Traffic analysis

答案: d)流量分析

Explanation:

说明:

In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.

在被动攻击中,攻击者不会修改数据的任何部分。 他的尝试仅是获取信息,而不是对其进行修改。 从上述选项中,这仅在流量分析中发生,攻击者在其中监视传输模式。 其余的其他选项是主动攻击的示例。



4) Which of the following options correctly defines the Brute force attack?

4)以下哪个选项正确定义了蛮力攻击?

  1. Brutally forcing the user to share the useful information like pins and passwords.

    残酷地迫使用户共享有用的信息,例如密码和密码。

  2. Trying every possible key to decrypt the message.

    尝试使用所有可能的密钥来解密消息。

  3. One entity pretends to be some other entity

    一个实体假装为另一个实体

  4. The message or information is modified before sending it to the receiver.

    消息或信息在发送到接收者之前被修改。

Answer: b) Trying every possible key to decrypt the message.

答案: b)尝试所有可能的密钥来解密消息。

Explanation:

说明:

Only option b) is the correct definition for brute force attack.

只有选项b)是蛮力攻击的正确定义。



5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?

5)“密钥是一串由密码算法用来将纯文本转换为密文的位。” 以下哪项能够成为密码算法的密钥?

  1. An integer values

    整数值

  2. A square matrix

    方阵

  3. An array of characters (i.e. a string)

    字符数组(即字符串)

  4. All of the above

    上述所有的

Answer: d) All of the above

答案: d)以上全部

Explanation:

说明:

As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm.

由于密钥可以是任何比特串,因此所有提及的选项都可以成为密码算法中的密钥。



翻译自: https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx

mcq 队列

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值