欢迎来到天天文库
浏览记录
ID:42438768
大小:109.50 KB
页数:8页
时间:2019-09-15
《信息安全基础样卷》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、选择题10*2分1.Whowrotethefirstcomputerviruswhichspreadwidely?()(a)KevinMitnick(b)RobertMorris(c)RonRivest(d)ClaudeShannon2.Theattackwaysofinterruption&fabricationdestroythesecurityattributesof(e)&(c)・(a)Confidentiality(b)Integrity(c)Authenticity(d)Authentication(e)Availability3.TheH
2、omophonecipherbelongsto()・(a)Single-letter&monoalphabetic(b)Single-letter&polyalphabetic(c)Multi-letter&monoalphabetic(d)Multi-letter&polyalphabetic4.WhichstepofDESalgorithmtransformsinputof56-bittooutputof48-bit?()(a)Etable(b)Sbox(c)Ppermutation(d)Permutatedchoice25.Complementa
3、rySymmetryofDESmakestheworkloadof()attackhalfofthenormal.(a)Ciphertextonly(b)Plaintextonly(c)Chosenplaintext(d)Knownplaintext6.Whichofthefollowingtechnologyiscalled"DigitalFingerprint?()(c)HashValue(a)MessageAuthenticationCode(b)MessageEncryption(d)DigitalSignature1.Whichitemisn
4、otnecessaryforacertificatecomparatively?()(a)Serialnumber(b)Subjectname(c)ValueofPU(d)SignaturemadebyCA2.InPKI,CAshouldn'tbackup().(a)PUforencryption(b)PRforencryption(c)PUforsignature(d)PRforsignature3.ThecharacterofBibaaccesscontrolmodeis(a),whichcanensure(D・(a)ReadUp,WriteDow
5、n(b)ReadDown,WriteUp(c)ReadUp,WriteUp(d)ReadDown,WriteDown(e)Secrecy(f)Integrity10・InTCSEC,Converttimingchannelisthecharacteristicof()・(a)B1(b)B2(c)B3(d)Al(e)BeyondA1注:9和10本次课没有讲到,是第五章的内容填空题10*1分1.TheadvantagesofConventionalCipherarespeedyforencryption&decryption;theadvantagesof
6、PublicKeyCipherareeasytodistribute&manaEekeynrealizedigitalsignature2.ThetwofactorstakenintoconsiderationofComputationalSecurityiscost&time・3.ThecoreoperationofVernamCipherisXOR••24.A2-rotormachinewith26lettershasaperiodof676(26)・(howmanyalphabets)5.TheS-Box6TableofDESisasfollow
7、s,theoutputofinput"101010"is1000・0123456789ABCDEF0C1AF92680D34E75B1AF427C9561DE0B3829EF528C3704A1DB63432C95FABE17608D6.The3factorsofaccesscontrolare,and简答题4*10分1.What'sthedifferencebetweenPassiveAttack&ActiveAttack?Givesomeexamplesofeach.Howtoprotectinformationagainstthetwoattac
8、ks?PassiveAttack:onlyinvolveeavesdropping&monit
此文档下载收益归作者所有