A.HMAC B.RSA C.MD5 D.SHA-1
单项选择题Whichexampleisofafunctionintendedforcryptographichashing?()
A.MD65 B.SHA-135 C.XR12 D.MD5
单项选择题WhichoneofthefollowingitemsmaybeaddedtoapasswordstoredinMD5tomakeitmoresecure?()
A.Ciphertext B.Salt C.Cryptotext D.Rainbow table
单项选择题Whichitemisthegreatmajorityofsoftwarevulnerabilitiesthathavebeendiscovered?()
A.Stack vulnerabilities B.Heap overflows C.Software overflows D.Buffer overflows
单项选择题Whichstatementistrueaboutvishing?()
A.Influencing users to forward a call to a toll number (for example, a long distance or international number) B.Influencing users to provide personal information over a web page C.Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number) D.Influencing users to provide personal information over the phone
单项选择题RefertoCiscoIOSZone-BasedPolicyFirewall,wherewilltheinspectionpolicybeapplied?()
A.to the zone-pair B.to the zone C.to the interface D.to the global service policy