一起答
单选

以下关于VPN的叙述中,正确的是()

  • A.VPN指的是用户通过公用网络建立的临时的、安全的连接
  • B.VPN指的是用户自己租用线路,和公共网络物理上完全隔离的、安全的线路
  • C.VPN不能做到信息认证和身份认证
  • D.VPN只能提供身份认证,不能提供数据加密的功能
参考答案
查看试卷详情
相关试题
  1. (1)is the science of hiding information.Where as the goal of cryp to graphy is to make data unreadable by a third party.the goal of steganography is to hide the data from a third party.In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software. There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spymovies),ranging from invisible inkandmicrodotstosecretingahiddenmessageinthesecondletterofeachwordofalargebodyoftextandspreadspectrumradiocommunication.With computersandnetworks,there arem any other ways of hiding informations,suchas: Covertchannels(c,g,Lokiandsomedistributeddenial-of-servicetoolsusetheInternetControl(3)Protocol,orICMP,asthecommunicationchannelbetweenthe“badguy”andacompromicyedsystem) HiddentextwithinWebpages Hidingfilesin“plainsight”(c,g.whatbetterplaceto“hide”afilethanwithanimportantsoundingnameinthec:\winntsystem32directory) Nullciphers(c,g,usingthefirstletterofeachwordtoformahiddenmessageinanotherwiseinnocuoustext) steganographytoday,however,issignificantlymore(4)than the example about suggest,allowing ausertohidelargeamountsofinformationwithinimageandaudio.Theseformsofsteganographyoftenareusedinconjunctionwith cryptographysothe information is double protected;firstitisencryptedandthenhiddensothatanadvertisementfirst.find the information(an often difficult task inandofitself)and the decryptedit. The simple stapproachtohidingdatawithinanimagefileiscalled(5)signatureinsertion.In this method,we can take the binaryrepresentationofthehiddendataandthebitofeachbytewithinthecovertimage.If weareusing 24-bitcolor the amount and will be minimum and indiscriminate to the human eye.

    • A.Cryptography
    • B.Geography
    • C.Stenography
    • D.Steganography
    • A.methods
    • B.software
    • C.tools
    • D.services
    • A.Member
    • B.Management
  2. 在DES算法中,需要进行16轮加密,每一轮的子密钥长度为()

    • A.16
    • B.32
    • C.48
    • D.64
  3. 67mod119的逆元是()

    • A.52
    • B.67
    • C.16
    • D.19
  4. AES结构由以下4个不同的模块组成,其中()是非线性模块

    • A.字节代换
    • B.行移位
    • C.列混淆
    • D.轮密钥加
  5. 杂凑函数SHAI的输入分组长度为()比特

    • A.128
    • B.258
    • C.512
    • D.1024
  6. 设在RSA的公钥密码体制中,公钥为(c,n)=(13,35),则私钥为()

    • A.11
    • B.13
    • C.15
    • D.17
  7. 两个密钥三重DES加密:C=CK1[DK2[EK1[P]]],K1≠K2,其中有效的密钥为()

    • A.56
    • B.128
    • C.168
    • D.112
  8. 包过滤技术防火墙在过滤数据包时,一般不关心()

    • A.数据包的源地址
    • B.数据包的协议类型
    • C.数据包的目的地址
    • D.数据包的内容
  9. 以下关于网络流量监控的叙述中,不正确的是()

    • A.流量检测中所检测的流量通常采集自主机节点、服务器、路由器接口和路径等
    • B.数据采集探针是专门用于获取网络链路流量的硬件设备
    • C.流量监控能够有效实现对敏感数据的过滤
    • D.网络流量监控分析的基础是协议行为解析技术
  10. 以下关于VPN的叙述中,正确的是()

    • A.VPN指的是用户通过公用网络建立的临时的、安全的连接
    • B.VPN指的是用户自己租用线路,和公共网络物理上完全隔离的、安全的线路
    • C.VPN不能做到信息认证和身份认证
    • D.VPN只能提供身份认证,不能提供数据加密的功能