Symmetric key encryption is also known as:
A: public key encryption.
B: secret key encryption.
C: PGP.
D: PKI.
A: public key encryption.
B: secret key encryption.
C: PGP.
D: PKI.
举一反三
- You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure thatyou minimize the usage of memory space and processor time. Which encryption type should you use?() A: Symmetric key encryption B: Asymmetric key encryption C: Certificate-based encryption D: Transparent data encryption
- This paper introduced the revolutionary concept of (5) and also provided a new and ingenious method for key exchange. The authors had no practical realization of a public-key encryption scheme at the time.
- KrbServer认证机制的核心要素包含哪些:() A: Kerberos Client B: Kerberos KDC Server C: AES(Advanced Encryption Standard) D: KDC(Key Distribution Center)
- 在加密过程中,必须用到的三个主要元素是( )。 A: 所传输的信息(明文) B: 加密钥匙(Encryption key) C: 加密函数 D: 传输信道
- Encryption(加密)shouldbeusedwhenasecretmessageisonline.