2022年网络安全期末复习题 .pdf
《2022年网络安全期末复习题 .pdf》由会员分享,可在线阅读,更多相关《2022年网络安全期末复习题 .pdf(5页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、网络安全期末复习题一、填空题:1、The three key objectives of computer security are confidentiality,,Integrity andAvailability(计算机安全的三个关键目标,保密性,完整性和可用性)2、Active Attack attempts to alter system resources or affect their operation.(主动攻击试图改变或影响其操作系统资源)3、Passive Attack attempts to learn or make use of information from t
2、he system but dose not affect system resources.(被动 攻击试图学习或者从系统中而不影响系统资源利用信息。)4、The process of attempting to discover the plaintext or key is known as cryptanalysis(试图发现明文或密钥的过程称为密码分析)5、0Two types of passive attacks are the release of message contents and traffic analysis.(被动攻击的两种类型是消息分析和流量分析)6、A sym
3、metric encryption scheme has five ingredients,they are plaintext,encryption algorithm,decryption algorithm,secret key and ciphertext.(对称加密方案有五种成分,它们是明文,加密算法,解密算法,密钥和密文)7、The two general approaches to attacking a cipher are cryptanalysis and brute-force attack。(一般攻击密码的两种方法:密码分析和蛮力攻击)8、)If the encrypt
4、ion algorithm of 3DES is C=E(K3,D(K2,E(K1,P),then the decryption algorithm is P=D(K1(E(K2、D(K3、C).(如果 3DES 加密算法是C=E(K3,D(E(K1,K2,P),然后解密算法是P=D(K1(E(K2、D(K3、C))9、With RSA algorithm,if the n is easily factored into its two prime factors,then the algorithm will be obsolete.(对于 RSA 算法,如果n 是容易分解成它的两个主要因素
5、,那么算法将被淘汰)10、A Public key certificateconsists of a public key plus a User ID of the key owner,with the whole block signed by a trusted third party.(一个公钥证书由公钥加上所有者的用户ID 以及可信的第三方签名的整个数据块组成。)11、The SSL Record Protocol provides two services for SSL connections:Confidentialityand Message Integrity.(SSl 记
6、录协议提供SSl 连接的两种服务:保密和消息完整性)12、To store the public private key pairs owned by the node and the public keys of other users known at this node,PGP provides a pair of data structures at each node.These data structures are referred to respectively,as the private-key ring and public key ring.(存储的公共密钥对由节点和其
7、他用户在这个节点已知公钥拥有,PGP 在每个节点提供了一种数据结构。这些数据结构被分别称为,私钥环和公钥环。)13、IPSec support two modes of use:transport mode and tunnel mode.(存储的公共密钥对由节点和IPSec支持两种使用方式:传输模式和隧道模式。0 14、The tunnel mode of IPSec provides protection to the entire IP packet.(IPSec 隧道模式对整个IP 数据包提供保护)二、判断题:1、(对)The emphasis in dealing with pass
8、ive attack is on prevention rather than detection.2、(错)Denial of service is a type of passive attack.3、(对)In DES,the plaintext is 64 bits in length and the key is 56 bits in length.4、(错)RC4 is block cipher.5、(错)Block cipher are almost always faster and use far less code than do stream cipher.6、(对)Fo
9、r lengthy message,the ECB mode may not be secure.名师资料总结-精品资料欢迎下载-名师精心整理-第 1 页,共 5 页 -7、(对)Symmetric encryption can be used to authenticate message.8、(对)Unlike the MAC,a hash function does not take a secret key as 9、(对)Compared to the encryption algorithm,the MAC authentication algorithm needs not be
10、 reversible.10、(错)Public-key encryption is general-purpose technique that conventional encryption obsolete.11、(错)All public-key algorithms can encrypt/decrypt message.12、(对)RES is a block cipher.13、(对)The principal objective for developing a PKI is to convenient,and efficient acquisition of public k
11、eys.14、(对)SSL/TLS provides confidentiality using symmetric encryption and message integrity using a message authentication code.15、(错)The smallest building block of a wireless LAN is an independent and service set(IBSS).16、(对)The principal feature of IPSec is that it can encrypt and/or authenticate
12、all traffic at the IP level.三、选择题:1.Of all the following options _doesn t belong to the security services A.Confidenticality(不属于安全服务)B.Integrity C.Secret key D.Authentication 2.A _attack involves trying every possible key until an intelligible translation of the cipertext into plaintext is obtained.
13、A.Brute-force(什么攻击涉及尝试每个可能的密钥直到得到的密文变成明文易懂的翻译。)B.ciphertext only C.known plaintext D.chosen text 3.For DES,which of following is false?_(对于 DES,下列哪种说法是错误的)A.DES is a block cipher B.the plaintext is processed in 80-bit blocks C.the key size is 56-bits D.plaintext goes through 16 iterations 4.All of f
14、ollowing are symmetric block ciphers except for_(不是对称分组密码)A.IDEA B.AES C.3DES D.RC4 5.In_ mode,the input to the encryption algorithms is the XOR of the current plaintext block and the preceding ciphertext block,the same key is used for each blocks.A.ECB(哪种 模式,输入到异或加密算法是当前和前面的ciphertext 明文块的块.)B.CBC
15、C.CFB D OFB 6._is not the requirement of hash function H.(_什么不是散列函数的一个要求。)名师资料总结-精品资料欢迎下载-名师精心整理-第 2 页,共 5 页 -A.H can be applied to a block of data of any size B.H produces a fixed length output C.H(x)is relatively easy to compute for any given x D.H must be shared secretly by both parties 7.For app
16、roaches to message authentication,the approach of_ doesn t need a secret key.A.Using conventional encryption(消息认证 的方法,什么方法不需要密钥。)B.MAC C.one-way hash code D.HMAC 8.The purpose of_ algorithm is to enable two users to exchange.A.DSS B.Diffie-Hellman key(哪种算法的目的是使两个用户交换)C.RSA D.ECC 9.Which of following
17、 is right about Kerberos?_(关于 Kerberos 下列哪一项是正确的)A.User must enter a password each time to access a server.B.A full-service Kerberos environment consist of a Kerberos number of clients,and a number of application servers.C.Kerberos also relies on public-key encryption.D.The ticket message transmitte
18、d is in clear.10.Which of following is not right about X.509 certificate?_(关于 X.509 证书,哪一个是错的)A.X.509 certificate must contains the public key of a user B.X.509 certificate format is used in IPSec and SSL C.X.509 certificate can be revoked before it expires D.X.509 certificate is signed with the pub
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2022年网络安全期末复习题 2022 网络安全 期末 复习题
限制150内