Information Security Technology 02 Password and Hidden Technology Test Paper

Information Security Technology 02 Password and Hidden Technology Test Paper


Dingdu! Here is the compilation of Xiao Ah Woo's study course materials. A good memory is not as good as a bad pen. Today is also a day to make progress. Let's advance together!
Insert picture description here

1. Multiple choice questions

1. In the RSA algorithm, what kind of operation is required to find C^sk mod r?

Insert picture description here

C (平方- 乘算法)

2. In the RSA algorithm, pk is known, sk is required, which operation is required

Insert picture description here

B(乘逆算法 )

3. Which step of 非线性the DES algorithm is ?

A. Initial replacement
B, S box replacement
C, P box replacement
D, reverse initial replacement

B (S盒代替)

4. 最基本The characteristics of digital watermarking are

A, robustness
B, safety
C, self-healing
D, invisibility

D(不可见性)

Expansion: Comparison of scope relationships

Insert picture description here

C

Two, multiple choice questions

5. What is the key length of the AES algorithm?

A, 64 bit B, 128 bit C, 192 bit D, 256 bit

(BCD)

6. Regarding the public encryption system and public key system, which of the following statements are correct

A. Key distribution and management are easier than a symmetric encryption system.
B. The decryption process can be easily derived from the encryption process.
C. There is no need to establish a protected channel to transfer the key.
D. The encryption speed is faster.

(AC)

7. What is the length of the plaintext group of the AES algorithm?

A, 64 bit B, 128 bit C, 192 bit D, 256 bit

(BCD)

8. Regarding the symmetric encryption system, which of the following statements are correct

A. Difficulty in key distribution and management
B. It is easy to derive the decryption process from the encryption process.
C. No need to establish a protected channel to transfer the key.
D. Fast encryption

(ABD)

9. Regarding the security of the DES algorithm, which of the following statements are correct

A. DES algorithm has fatal weaknesses.
B. DES algorithm has not been used at all.
C. DES algorithm can no longer meet the needs of information security.
D. Triple DES and DES are compatible

(ACD)

10. Regarding the DES algorithm, which of the following statements are correct

A. It is a symmetric cipher algorithm
B, it is a sequence cipher algorithm
C, its block length is 64 bits
D, its key length is 64 bits

(AC)

Ending!
More course knowledge learning records will come later!

就酱,嘎啦!

Insert picture description here

Note:
Life is diligent, nothing is gained.

Guess you like

Origin blog.csdn.net/qq_43543789/article/details/109185174
Recommended