A.Top-secret B.Confidential C.SBU D.Secret
单项选择题Whichisthemaindifferencebetweenhost-basedandnetwork-basedintrusionprevention?()
A.Host-based IPS can work in promiscuous mode or inline mode. B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers. C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows. D.Host-based IPS deployment requires less planning than network-based IPS.
单项选择题Whichalgorithmwasthefirsttobefoundsuitableforbothdigitalsigningandencryption?()
A.HMAC B.RSA C.MD5 D.SHA-1
单项选择题Whichexampleisofafunctionintendedforcryptographichashing?()
A.MD65 B.SHA-135 C.XR12 D.MD5
单项选择题WhichoneofthefollowingitemsmaybeaddedtoapasswordstoredinMD5tomakeitmoresecure?()
A.Ciphertext B.Salt C.Cryptotext D.Rainbow table
单项选择题Whichitemisthegreatmajorityofsoftwarevulnerabilitiesthathavebeendiscovered?()
A.Stack vulnerabilities B.Heap overflows C.Software overflows D.Buffer overflows