信息安全工程师上午题英文题汇总

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Securing network infrastructure is like(C)possible en points of attacks on a country by deploying appropriate defense. Computer security is more like providing means to(D) a single PC against outside intrusion. The former is better and practical to protect the civilians from getting exposed to the attacks. (D)attempt to secure the access to individual computers…the network itself-thereby protecting the computers and other shared resources such as printers, network-attached storage connected by the network. Attacks could be stopped at their en points before they spread. As opposed to this, in computer security the measures taken are focused on securing individual computer hosts. A computer host whose security is compromised is likely to infect other hosts connected to a potentially(B). A computer host's security is vulnerable to users with higher (C)to those hosts.

A. assuring

B. guarantee

C. securing

D. proving

A. ensure

B. keep

C. support

D. protect

A. The attack means

B. The attack target

C.The cyber security

D.The preventive measures

A. Secure network

B. unsecured network

C. Botnet

D. Vulnerability Network

A. access mechanism

B. Secure access

C. access privileges

D. access means

Much of the theoretical work in cryptography concerns cryptographic primitives algorithms with basic cryptographic properties - and their relationship to other cryptographic problems. More complicated cryptographic tools are then built from these basic primitives. Complex functionality in an application must be built in using combinations of these algorithms and assorted protocols. Such combinations are called(B) and it is they which users actually encounter. Examples include PGP and its variants, ssh, SSL/TLS, all PKIs, (C), etc For example, a (B) is function intended to be easy to compute but hard to invert.

But note that, in a very general sense, for any cryptographic application to be secure (if based on computational feasibility assumptions) one-way functions must exist. However, if one-way functions exist, this implies that (D)≠NP. Since the P versus NP problem is currently unsolved, it is not known if one-way functions really do exist. For instance, if one way functions exist, then secure pseudorandom generators and secure pseudorandom functions exist.

Other (A)include the encryption algorithms themselves, one-way permutations, trapdoor permutations, etc.

A. Password base

B. cryptosystems

C. Principles of cryptography

D. Equipment system

A. Certification

B. Digest Summary

C. digital signatures

D. Identification

A. Hash function

B. one-way function

C. Bidirectional function

D. Power function

A. NPC

B. N

C. NP

D. P

A. cryptographic primitives

B. Principles of cryptography

C. cryptosystems

D. Password base

相关文档
最新文档