Information Security Technology 03 Digital Signature and Certification Test Paper

Information Security Technology 03 Digital Signature and Certification Test Paper


Dingdu! Here is the compilation of Xiao Ah Woo's study course materials. A good memory is not as good as a bad pen. Today is also a day to make progress. Let's advance together!
Insert picture description here

1. Multiple choice questions

1. (This question belongs to Chapter 3) What is the number of hexadecimal characters obtained after hashing the plaintext "abcdefgh" with SHA-1?

A、128
B、160
C、32
D、40

我的答案:D

2 (This question belongs to Chapter 3) What is the one-way property of one-way hash function?

A. When M is known, it is easy to calculate h by using h(M).
B. When h is known, it is very difficult to calculate M from h(M).
C. The Hash function can generate a fixed-length hash value h from M of any length.
D. When M is known, it is very difficult to find another information M', so that h(M)=h(M').

我的答案:B

3 (This question belongs to Chapter 3) What is the collision resistance of one-way hash function?

A. When M is known, it is easy to calculate h by using h(M).
B. When M is known, it is very difficult to find another information M', so that h(M)=h(M').
C. When h is known, it is very difficult to calculate M from h(M).
D. The Hash function can generate a fixed-length hash value h from M of any length.

我的答案:B

Two, multiple choice questions

1. (This question belongs to Chapter 3) What are the problems of digital signatures in network communication?
A, forgery
B, impersonating
C, denying
D, tampering

我的答案:ABCD

2 (This question belongs to Chapter 3) What features should a digital signature have?

A, cannot be verified
B, cannot be tampered with
C, cannot be denied
D, cannot be forged

我的答案:BCD

3 (This question belongs to Chapter 3) The main standards related to PKI include?

A、X.509
B、ASN.1
C、PKCS
D、HTTPS

我的答案:ABC

4 (This question belongs to Chapter 3) The basic components of PKI include?

A. Digital certificate library
B, certification authority
C, certificate revocation processing system
D, key backup and recovery system

我的答案:ABCD

5 (This question belongs to Chapter 3) The operations involved in verifying the signature include?

A, encryption
B, comparison
C, Hash
D, decryption

我的答案:BCD

6 (This question belongs to Chapter 3) What are the operations involved in the digital signature phase (signature is not verified)?

A, encryption
B, Hash
C, comparison
D, decryption

我的答案:AB

7 (This question belongs to Chapter 3) Is the statement about the signature key pair and the encryption key pair correct?

A. The signature key pair should be backed up
B, the encryption key pair should be backed up
C, PKI requires that the signature key and the encryption key must be used separately
D, the signature key pair is composed of the signature private key and the verification signature public key

我的答案:BCD

Ending!
More course knowledge learning records will come later!

就酱,嘎啦!

Insert picture description here

Note:
Life is diligent, nothing is gained.

Guess you like

Origin blog.csdn.net/qq_43543789/article/details/108582771