Newer
Older
csv2brain / app / src / main / assets / exam / c_8_02.json
ubt on 24 Jan 2024 36 KB 增加习题列表
{"msg":"第二节 数据安全和保密,加密与解密机制","code":200,"data":{"currentIndex":null,"examId":null,"examTime":null,"questionList":[{"id":"796239195231244289","title":"用户A从CA处获取了用户B的数字证书,用户A通过(6)可以确认该数字证书的有效性。","analyze":"用户B的数字证书中包含了CA的签名,因此用CA的公钥可验证数字证书的有效性。","multi":0,"questionType":1,"answer":"C","chooseItem":["796239196367900673"],"itemList":[{"id":"796239196300791809","questionId":"796239195231244289","content":" 用户B的公钥","answer":0,"chooseValue":"A"},{"id":"796239196334346241","questionId":"796239195231244289","content":" 用户B的私钥","answer":0,"chooseValue":"B"},{"id":"796239196367900673","questionId":"796239195231244289","content":" CA的公钥","answer":1,"chooseValue":"C"},{"id":"796239196401455105","questionId":"796239195231244289","content":" 用户A的私钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239180047863809","title":"在X.509标准中,不包含在数字证书中的是(8)。","analyze":"本题考查数字证书的基础知识。<br>数字证书中包含用户的公钥,而用户的私钥只能被用户拥有。所以选项D是不可能包含在数字证书中的。","multi":0,"questionType":1,"answer":"D","chooseItem":["796239181226463233"],"itemList":[{"id":"796239181134188545","questionId":"796239180047863809","content":" 序列号","answer":0,"chooseValue":"A"},{"id":"796239181163548673","questionId":"796239180047863809","content":" 签名算法","answer":0,"chooseValue":"B"},{"id":"796239181192908801","questionId":"796239180047863809","content":" 认证机构的签名","answer":0,"chooseValue":"C"},{"id":"796239181226463233","questionId":"796239180047863809","content":" 私钥","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239163488751617","title":"下列算法中,用于密钥交换的是(9)。","analyze":"本题考查安全算法方面的知识。<br>题中的4个选项中,DES是一种经典的数据加密算法,AES是高级加密算法,Diffie-Hellman是一种密钥交换算法,SHA属于报文摘要算法。","multi":0,"questionType":1,"answer":"C","chooseItem":["796239164512161793"],"itemList":[{"id":"796239164449247233","questionId":"796239163488751617","content":" DES","answer":0,"chooseValue":"A"},{"id":"796239164482801665","questionId":"796239163488751617","content":" SHA-1","answer":0,"chooseValue":"B"},{"id":"796239164512161793","questionId":"796239163488751617","content":" Diffie-Hellman","answer":1,"chooseValue":"C"},{"id":"796239164545716225","questionId":"796239163488751617","content":" AES","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239186209296385","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>某数字签名系统如下图所示。网上传送的报文是(7),如果A否认发送,作为证据的是(8)。<br><br><img alt=\"\" width=\"615\" height=\"146\" src=\"https://image.chaiding.com/ruankao/1c90dd8a657c6cf1b0cb3014e736f673.jpg?x-oss-process=style/ruankaodaren\">","analyze":"本题考査数字签名的实现细节。<br>图中所示为一种利用公钥加密算法实现的数字签名方案,发送方A要发送给接收方B的报文P经过A的私钥签名和B的公钥加密后形成报文E<sub>B</sub>(D<sub>A</sub>(P))发送给B, B利用自己的私钥DB和A的公钥EA对消息E<sub>B</sub>(D<sub>A</sub>(P))进行解密和认证后得到报文P,并且保存经过A签名的消息D<sub>A</sub>(P)作为防止A抵赖的证据。","multi":0,"questionType":1,"answer":"C","chooseItem":["796239187190763521"],"itemList":[{"id":"796239187132043265","questionId":"796239186209296385","content":" P","answer":0,"chooseValue":"A"},{"id":"796239187161403393","questionId":"796239186209296385","content":" D<sub>A</sub>(P)","answer":0,"chooseValue":"B"},{"id":"796239187190763521","questionId":"796239186209296385","content":" E<sub>B</sub>(D<sub>A</sub>(P))","answer":1,"chooseValue":"C"},{"id":"796239187232706561","questionId":"796239186209296385","content":" D<sub>A</sub>","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239209735147521","title":"甲和乙要进行通信,甲对发送的消息附加了数字签名,乙收到该消息可用(8)验证该消息数字签名的真伪。","analyze":"本题考查数字签名的概念。<br>数字签名(Digital Signature)技术是不对称加密算法的典型应用:数据源发送方使用自己的私钥对数据校验和(或)其他与数据内容有关的变量进行加密处理,完成对数据的合法“签名”,数据接收方则利用对方的公钥来解读收到的“数字签名”,并将解读结果用于对数据完整性的检验,以确认签名的合法性。数字签名的主要功能是保证信息 传输的完整性、发送者的身份认证、防止交易中的抵赖现象发生。","multi":0,"questionType":1,"answer":"A","chooseItem":["796239210670477313"],"itemList":[{"id":"796239210670477313","questionId":"796239209735147521","content":" 甲的公钥","answer":1,"chooseValue":"A"},{"id":"796239210708226049","questionId":"796239209735147521","content":" 甲的私钥","answer":0,"chooseValue":"B"},{"id":"796239210741780481","questionId":"796239209735147521","content":" 乙的公钥","answer":0,"chooseValue":"C"},{"id":"796239210779529217","questionId":"796239209735147521","content":" 乙的私钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239171684421633","title":"以下关于利用三重DES进行加密的说法,(6)是正确的。","analyze":"本题考查三重DES的知识。<br>三重DES是DES的改进算法,它使用两把密钥对报文作三次DES加密,效果相当于将DES密钥的长度加倍了,克服了DES密钥长度较短的缺点。本来,应该使用三个不同的密钥进行三次加密,这样就可以把密钥的长度加长到3x56=168位。但许多密码设计者认为168位的密钥已经超过实际需要了,所以便在第一层和第三层中使用相同的密钥,产生一个有效长度为112位的密钥。之所以没有直接采用两重DES,是因为第二层DES不是十分安全,它对一种称为“中间可遇”的密码分析攻击极为脆弱,所以最终还是采用了利用两个密钥进行三重DES加密操作。这种方法的缺点是要花费原来三倍的时间,但从另一方面来看,三重DES的112位密钥长度是很“强壮”的加密方式了。","multi":0,"questionType":1,"answer":"C","chooseItem":["796239172795912193"],"itemList":[{"id":"796239172712026113","questionId":"796239171684421633","content":" 三重DES的密钥长度是56位","answer":0,"chooseValue":"A"},{"id":"796239172753969153","questionId":"796239171684421633","content":" 三重DES使用三个不同的密钥进行三次加密","answer":0,"chooseValue":"B"},{"id":"796239172795912193","questionId":"796239171684421633","content":" 三重DES的安全性高于DES","answer":1,"chooseValue":"C"},{"id":"796239172821078017","questionId":"796239171684421633","content":" 三重DES的加密速度比DES加密速度快","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239189740900353","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>某数字签名系统如下图所示。网上传送的报文是(7),如果A否认发送,作为证据的是(8)。<br><br><img alt=\"\" width=\"615\" height=\"146\" src=\"https://image.chaiding.com/ruankao/f06d534d6bbfe026a9d39ed747aa30c5.jpg?x-oss-process=style/ruankaodaren\">","analyze":"本题考査数字签名的实现细节。<br>图中所示为一种利用公钥加密算法实现的数字签名方案,发送方A要发送给接收方B的报文P经过A的私钥签名和B的公钥加密后形成报文E<sub>B</sub>(D<sub>A</sub>(P))发送给B, B利用自己的私钥DB和A的公钥EA对消息E<sub>B</sub>(DA(P))进行解密和认证后得到报文P,并且保存经过A签名的消息D<sub>A</sub>(P)作为防止A抵赖的证据。","multi":0,"questionType":1,"answer":"B","chooseItem":["796239190848196609"],"itemList":[{"id":"796239190818836481","questionId":"796239189740900353","content":" P","answer":0,"chooseValue":"A"},{"id":"796239190848196609","questionId":"796239189740900353","content":" D<sub>A</sub>(P)","answer":1,"chooseValue":"B"},{"id":"796239190885945345","questionId":"796239189740900353","content":" E<sub>B</sub>(D<sub>A</sub>(P))","answer":0,"chooseValue":"C"},{"id":"796239190915305473","questionId":"796239189740900353","content":" D","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239176956661761","title":"利用报文摘要算法生成报文摘要的目的是(7)。","analyze":"本题考查报文摘要的知识。<br>报文摘要是指单向哈希函数算法将任意长度的输入报文经计算得出固定位的输出。报文摘要是用来保证数据完整性的。传输的数据一旦被修改那么计算出的摘要就不同,只要对比两次摘要就可确定数据是否被修改过。","multi":0,"questionType":1,"answer":"D","chooseItem":["796239177954906113"],"itemList":[{"id":"796239177862631425","questionId":"796239176956661761","content":" 验证通信对方的身份,防止假冒","answer":0,"chooseValue":"A"},{"id":"796239177891991553","questionId":"796239176956661761","content":" 对传输数据进行加密,防止数据被窃听","answer":0,"chooseValue":"B"},{"id":"796239177925545985","questionId":"796239176956661761","content":" 防止发送方否认发送过的数据","answer":0,"chooseValue":"C"},{"id":"796239177954906113","questionId":"796239176956661761","content":" 防止发送的报文被篡改","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239168752603137","title":"下列选项中,同属于报文摘要算法的是(67)。","analyze":"本题考查安全算法相关常识。<br>数据加密的基本过程就是对原来为明文的文件或数据按某种算法进行处理,使其成为不可读的一段代码,通常称为“密文”,使其只能在输入相应的密钥之后才显示出本来内容,通过这样的途径来达到保护数据不被非法人员窃取、阅读的目的。<br>常见加密算法有 DES (Data Encryption Standard)、3DES (Triple DES)、RC2 和RC4、IDEA (International Data Encryption Algorithm), RSA。<br>报文摘要算法主要应用在“数字签名”领域,作为对明文的摘要算法。著名的摘要算法有RSA公司的MD5算法和SHA1算法及其大量的变体。","multi":0,"questionType":1,"answer":"B","chooseItem":["796239169696321537"],"itemList":[{"id":"796239169666961409","questionId":"796239168752603137","content":" DES和MD5","answer":0,"chooseValue":"A"},{"id":"796239169696321537","questionId":"796239168752603137","content":" MD5和SHA-1","answer":1,"chooseValue":"B"},{"id":"796239169721487361","questionId":"796239168752603137","content":" RSA和SHA-1","answer":0,"chooseValue":"C"},{"id":"796239169746653185","questionId":"796239168752603137","content":" DES和RSA","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796239183281672193","title":"支持电子邮件加密服务的标准或技术是(8)。","analyze":"本题考查电子邮件加密服务的知识。<br>PKI即公钥基础设施,是一种遵循既定标准的密钥管理平台,它能够为所有网络应用提供加密和数字签名等密码服务及所必需的密钥和证书管理体系。<br>SET即安全电子交易协议,是美国Visa和MasterCard两大信用卡组织等联合于1997年5月31日推出的用于电子商务的行业规范,其实质是一种应用在Internet上、以信用卡为基础的电子付款系统规范,目的是为了保证网络交易的安全。<br>Kerberos是一种网络认证协议,其设计目标是通过密钥系统为客户机/服务器应用程序提供强大的认证服务。<br>PGP是一个基于RSA公匙加密体系的邮件加密软件。可以用它对邮件保密以防止非授权者阅读,它还能对邮件加上数字签名从而使收信人可以确认邮件的发送者,并能确信邮件没有被篡改。","multi":0,"questionType":1,"answer":"A","chooseItem":["796239184191836161"],"itemList":[{"id":"796239184191836161","questionId":"796239183281672193","content":" PGP","answer":1,"chooseValue":"A"},{"id":"796239184221196289","questionId":"796239183281672193","content":" PKI","answer":0,"chooseValue":"B"},{"id":"796239184250556417","questionId":"796239183281672193","content":" SET","answer":0,"chooseValue":"C"},{"id":"796239184279916545","questionId":"796239183281672193","content":" Kerberos","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234777064656897","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>DES是一种(6),其密钥长度为56位,3DES是利用DES的加密方式,对明文进行3次加密,以提高加密强度,其密钥长度是(7)位。","analyze":"本题考查对称加密算法DES的基本知识。<br>1977年1月,美国NSA根据IBM的专利技术Lucifer制定了DES加密算法,该加密算法的加密过程是,将明文分成64位的块,对每个块进行19次变换(替代和换位),其中16次变换由56位的密钥的排列形式控制,最后产生64位的密文块。<br>1977年,Diffie和Heilman设计了DES解密机。只要知道一小段明文和对应密文,该机器就可以在一天之内穷试2<sup>56</sup>种不同的密钥。为了提高DES的加密强度,设计了三重DES(Triple-DES),是一种DES的改进算法。它使用两把密钥对报文做3次DES加密,效果相当于将DES密钥的长度加倍,克服了DES密钥长度短的缺点。这样密钥的长度增长到168位,但168位长度的密钥已经超出了实际需要,因此在第一层和第三层中使用相同的密钥,产生的密钥长度为112位。","multi":0,"questionType":1,"answer":"A","chooseItem":["796234777995792385"],"itemList":[{"id":"796234777995792385","questionId":"796234777064656897","content":" 共享密钥","answer":1,"chooseValue":"A"},{"id":"796234778050318337","questionId":"796234777064656897","content":" 公开密钥","answer":0,"chooseValue":"B"},{"id":"796234778088067073","questionId":"796234777064656897","content":" 报文摘要","answer":0,"chooseValue":"C"},{"id":"796234778109038593","questionId":"796234777064656897","content":" 访问控制","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234780084555777","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>DES是一种(6),其密钥长度为56位,3DES是利用DES的加密方式,对明文进行3次加密,以提高加密强度,其密钥长度是(7)位。","analyze":"本题考查对称加密算法DES的基本知识。<br>1977年1月,美国NSA根据IBM的专利技术Lucifer制定了DES加密算法,该加密算法的加密过程是,将明文分成64位的块,对每个块进行19次变换(替代和换位),其中16次变换由56位的密钥的排列形式控制,最后产生64位的密文块。<br>1977年,Diffie和Heilman设计了DES解密机。只要知道一小段明文和对应密文,该机器就可以在一天之内穷试2<sup>56</sup>种不同的密钥。为了提高DES的加密强度,设计了三重DES(Triple-DES),是一种DES的改进算法。它使用两把密钥对报文做3次DES加密,效果相当于将DES密钥的长度加倍,克服了DES密钥长度短的缺点。这样密钥的长度增长到168位,但168位长度的密钥已经超出了实际需要,因此在第一层和第三层中使用相同的密钥,产生的密钥长度为112位。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234781036662785"],"itemList":[{"id":"796234781011496961","questionId":"796234780084555777","content":" 56","answer":0,"chooseValue":"A"},{"id":"796234781036662785","questionId":"796234780084555777","content":" 112","answer":1,"chooseValue":"B"},{"id":"796234781061828609","questionId":"796234780084555777","content":" 128","answer":0,"chooseValue":"C"},{"id":"796234781091188737","questionId":"796234780084555777","content":" 168","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235025115795457","title":"SHA-1是一种针对不同输入生成( )固定长度摘要的算法。","analyze":"本题考查SHA-1的基本知识。<br>SHA (The Secure Hash Algorithm)安全散列算法是由美国国家标准和技穴协会于1993年提出的,被定义为安全散列标准。SHA-1是1994年修订的版本,纠正了SHA的不能接收小于264的报文输入。SHA-1可接收任意长度的报文输入,并产生固定长度(160 位)的输出,从一个文档得到的散列值,要找到第二个不同的输入能够产生相同的散列值,是非常困难的,因此该算法可用于对报文的认证。","multi":0,"questionType":1,"answer":"B","chooseItem":["796235026021765121"],"itemList":[{"id":"796235026004987905","questionId":"796235025115795457","content":" 128位","answer":0,"chooseValue":"A"},{"id":"796235026021765121","questionId":"796235025115795457","content":" 160位","answer":1,"chooseValue":"B"},{"id":"796235026034348033","questionId":"796235025115795457","content":" 256位","answer":0,"chooseValue":"C"},{"id":"796235026046930945","questionId":"796235025115795457","content":" 512位","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234295730524161","title":"SHA-256是( )算法。","analyze":"本题考查信息安全中的报文摘要算法的相关知识。<br> SHA-256是安全散列算法(Secure Hash Algorithm, SHA)的一种,是能计算出一个数字消息所对应到的、长度固定的字符串(又称消息摘要,报文摘要)的算法。若输入的消息不同,它们就对应到不同的字符串。SHA家族的算法,是由美国国家安全局(NSA)所设计,并由美国国家标准与技术研究院(NIST)发布的政府标准。","multi":0,"questionType":1,"answer":"D","chooseItem":["796234296682631169"],"itemList":[{"id":"796234296640688129","questionId":"796234295730524161","content":" 加密","answer":0,"chooseValue":"A"},{"id":"796234296657465345","questionId":"796234295730524161","content":" 数字签名","answer":0,"chooseValue":"B"},{"id":"796234296670048257","questionId":"796234295730524161","content":" 认证","answer":0,"chooseValue":"C"},{"id":"796234296682631169","questionId":"796234295730524161","content":" 报文摘要","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235015988989953","title":"三重DES加密使用2个密钥对明文进行3次加密,其密钥长度为( )位。","analyze":"本题考查DES加密的基本知识。<br>三重DES加密是对DES加密的一种改进算法,它使用两个密钥对报文做三次DES 加密,加强了原DES的加密强度。经过对可行性和实际需要的折中,采用了两个密钥进行三次加密,产生112位有效长度的密钥。","multi":0,"questionType":1,"answer":"B","chooseItem":["796235017016594433"],"itemList":[{"id":"796235016983040001","questionId":"796235015988989953","content":" 56","answer":0,"chooseValue":"A"},{"id":"796235017016594433","questionId":"796235015988989953","content":" 112","answer":1,"chooseValue":"B"},{"id":"796235017045954561","questionId":"796235015988989953","content":" 128","answer":0,"chooseValue":"C"},{"id":"796235017079508993","questionId":"796235015988989953","content":" 168","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235260001013761","title":"下列不属于报文认证算法的是(9)。","analyze":"RC4是一种加密算法,并非摘要算法。","multi":0,"questionType":1,"answer":"C","chooseItem":["796235261129281537"],"itemList":[{"id":"796235261053784065","questionId":"796235260001013761","content":" MD5","answer":0,"chooseValue":"A"},{"id":"796235261087338497","questionId":"796235260001013761","content":" SHA-1","answer":0,"chooseValue":"B"},{"id":"796235261129281537","questionId":"796235260001013761","content":" RC4","answer":1,"chooseValue":"C"},{"id":"796235261154447361","questionId":"796235260001013761","content":" HMAC","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234783091871745","title":"下列算法中,用于数字签名中摘要的是( )。","analyze":"本题考查加密算法及相关知识。 <br>RSA、IDEA和RC4均用于加密传输,仅MD5用于摘要。数字签名中先生成摘要,然后采用加密算法对摘要进行加密。","multi":0,"questionType":1,"answer":"D","chooseItem":["796234784165613569"],"itemList":[{"id":"796234784060755969","questionId":"796234783091871745","content":" RSA","answer":0,"chooseValue":"A"},{"id":"796234784106893313","questionId":"796234783091871745","content":" IDEA","answer":0,"chooseValue":"B"},{"id":"796234784140447745","questionId":"796234783091871745","content":" RC4","answer":0,"chooseValue":"C"},{"id":"796234784165613569","questionId":"796234783091871745","content":" MD5","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235022108479489","title":"假定用户A、B 分别在I<sub>1</sub>和I<sub>2</sub>两个CA处取得了各自的证书,( )是A、B互信的必要条件。","analyze":"本题考查证书认证的基本知识。<br>用户可在认证机构(CA)取得各自能够认证自身身份的数字证书,与该用户在同一机构取得的数字证书可通过相互的公钥认证彼此的身份;当两个用于所使用的证书来自于不同的认证机构时,用户双方要相互确定对方的身份之前,首先需要确定彼此的证书颁发机构的可信度。即两个CA之间的身份认证,需交换两个CA的公钥用以确定CA 的合法性,然后再进行用户的身份认证。","multi":0,"questionType":1,"answer":"D","chooseItem":["796235023098335233"],"itemList":[{"id":"796235023022837761","questionId":"796235022108479489","content":" A、B互换私钥","answer":0,"chooseValue":"A"},{"id":"796235023048003585","questionId":"796235022108479489","content":" A、B互换公钥","answer":0,"chooseValue":"B"},{"id":"796235023068975105","questionId":"796235022108479489","content":" I<sub>1</sub>、I<sub>2</sub>互换私钥","answer":0,"chooseValue":"C"},{"id":"796235023098335233","questionId":"796235022108479489","content":" I<sub>1</sub>、I<sub>2</sub>互换公钥","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234301644492801","title":"根据国际标准ITUT X.509规定,数字证书的一般格式中会包含认证机构的签名,该数据域的作用是( )。","analyze":"本题考查信息安全中的X.509数字证书的知识。<br> X.509是密码学里公钥证书的格式标准。X.509证书已应用在包括TLS/SSL在内的众多网络协议里,同时它也用在很多非在线应用场景里,比如电子签名服务。X.509证书里含有公钥、身份信息(比如网络主机名、组织的名称或个体名称等)和签名信息(可以是证书签发机构CA的签名,也可以是自签名)。对于一份经由可信的证书签发机构签名或者可以通过他方式验证的证书,证书的拥有者就可以用证书及相应的私钥来创建安全的通信,对文档进行数字签名。除了证书本身功能,X.509还附带了证书吊销列表和用于从最终对证书进行签名的证书签发机构直到最终可信点为止的证书合法性验证算法。X.509是ITU-T标准化部门基于他们之前的ASN.1定义的一套证书标准。<br> 证书中包含的认证机构签名用于防止证书的伪造。","multi":0,"questionType":1,"answer":"C","chooseItem":["796234302596599809"],"itemList":[{"id":"796234302558851073","questionId":"796234301644492801","content":" 用于标识颁发证书的权威机构CA","answer":0,"chooseValue":"A"},{"id":"796234302575628289","questionId":"796234301644492801","content":" 用于指示建立和签署证书的CA的X.509名字","answer":0,"chooseValue":"B"},{"id":"796234302596599809","questionId":"796234301644492801","content":" 用于防止证书伪造","answer":1,"chooseValue":"C"},{"id":"796234302617571329","questionId":"796234301644492801","content":" 用于传递CA的公钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234545966895105","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>用户A从CA获取了自己的数字证书,该数字证书中包含为证书进行数字签名的(8)和<span>(9)</span>。","analyze":"本题考查信息安全基础知识。<br> CA(Certificate Authority)即颁发数字证书的机构,是负责发放和管理数字证书的权威机构,并作为电子商务交易中受信任的第三方,承担公钥体系中公钥的合法性检验的责任。<br> 数字证书在用户公钥后附加了用户信息及CA的签名。公钥是密钥对的一部分,另一部分是私钥。公钥公之于众,谁都可以使用。私钥只有自己知道。由公钥加密的信息只能由与之相对应的私钥解密。为确保只有某个人才能阅读自己的信件,发送者要用收件人的公钥加密信件;收件人便可用自己的私钥解密信件。同样,为证实发件人的身份,发送者要用自己的私钥对信件进行签名;收件人可使用发送者的公钥对签名进行验证,以确认发送者的身份。","multi":0,"questionType":1,"answer":"D","chooseItem":["796234547137105921"],"itemList":[{"id":"796234547023859713","questionId":"796234545966895105","content":" CA的私钥","answer":0,"chooseValue":"A"},{"id":"796234547061608449","questionId":"796234545966895105","content":" CA的公钥","answer":0,"chooseValue":"B"},{"id":"796234547099357185","questionId":"796234545966895105","content":" A的私钥","answer":0,"chooseValue":"C"},{"id":"796234547137105921","questionId":"796234545966895105","content":" A的公钥","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234542892470273","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>用户A从CA获取了自己的数字证书,该数字证书中包含为证书进行数字签名的(8)和(9)。","analyze":"本题考查信息安全基础知识。<br> CA(Certificate Authority)即颁发数字证书的机构,是负责发放和管理数字证书的权威机构,并作为电子商务交易中受信任的第三方,承担公钥体系中公钥的合法性检验的责任。<br> 数字证书在用户公钥后附加了用户信息及CA的签名。公钥是密钥对的一部分,另一部分是私钥。公钥公之于众,谁都可以使用。私钥只有自己知道。由公钥加密的信息只能由与之相对应的私钥解密。为确保只有某个人才能阅读自己的信件,发送者要用收件人的公钥加密信件;收件人便可用自己的私钥解密信件。同样,为证实发件人的身份,发送者要用自己的私钥对信件进行签名;收件人可使用发送者的公钥对签名进行验证,以确认发送者的身份。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234543878131713"],"itemList":[{"id":"796234543848771585","questionId":"796234542892470273","content":" CA的私钥","answer":0,"chooseValue":"A"},{"id":"796234543878131713","questionId":"796234542892470273","content":" CA的公钥","answer":1,"chooseValue":"B"},{"id":"796234543907491841","questionId":"796234542892470273","content":" A的私钥","answer":0,"chooseValue":"C"},{"id":"796234543928463361","questionId":"796234542892470273","content":" A的公钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235251016814593","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>用户乙收到甲数字签名后的消息M,为验证消息的真实性,首先需要从CA获取用户甲的数字证书,该数字证书中包含(6),并利用(7)验证该证书的真伪,然后利用(8)验证M的真实性。","analyze":"本题考查数字签名和CA方面的基础知识。 <br>CA是认证中心的简称,为了能够在互联网上认证通信双方的身份,可以在相应的认证中心申请自己的数字证书。CA为用户颁发的数字证书中包含用户的公钥信息、权威机构的认证信息和有效期等。用户收到经数字签名的消息后,须首先验证证书的真伪,即使用证书的公钥来验证,然后利用对方的公钥来验证消息的真实性。","multi":0,"questionType":1,"answer":"A","chooseItem":["796235252082167809"],"itemList":[{"id":"796235252082167809","questionId":"796235251016814593","content":" 甲的公钥","answer":1,"chooseValue":"A"},{"id":"796235252098945025","questionId":"796235251016814593","content":" 甲的私钥","answer":0,"chooseValue":"B"},{"id":"796235252111527937","questionId":"796235251016814593","content":" 乙的公钥","answer":0,"chooseValue":"C"},{"id":"796235252128305153","questionId":"796235251016814593","content":" 乙的私钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235254204485633","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>用户乙收到甲数字签名后的消息M,为验证消息的真实性,首先需要从CA获取用户甲的数字证书,该数字证书中包含(6),并利用(7)验证该证书的真伪,然后利用(8)验证M的真实性。","analyze":"本题考查数字签名和CA方面的基础知识。 <br>CA是认证中心的简称,为了能够在互联网上认证通信双方的身份,可以在相应的认证中心申请自己的数字证书。CA为用户颁发的数字证书中包含用户的公钥信息、权威机构的认证信息和有效期等。用户收到经数字签名的消息后,须首先验证证书的真伪,即使用证书的公钥来验证,然后利用对方的公钥来验证消息的真实性。","multi":0,"questionType":1,"answer":"A","chooseItem":["796235255097872385"],"itemList":[{"id":"796235255097872385","questionId":"796235254204485633","content":" CA的公钥","answer":1,"chooseValue":"A"},{"id":"796235255114649601","questionId":"796235254204485633","content":" 乙的私钥","answer":0,"chooseValue":"B"},{"id":"796235255127232513","questionId":"796235254204485633","content":" 甲的公钥","answer":0,"chooseValue":"C"},{"id":"796235255139815425","questionId":"796235254204485633","content":" 乙的公钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235257060806657","title":"<p><strong>请作答第<span style=\"color: red\">3</span>个空。</strong></p>用户乙收到甲数字签名后的消息M,为验证消息的真实性,首先需要从CA获取用户甲的数字证书,该数字证书中包含(6),并利用(7)验证该证书的真伪,然后利用(8)验证M的真实性。","analyze":"本题考查数字签名和CA方面的基础知识。 <br>CA是认证中心的简称,为了能够在互联网上认证通信双方的身份,可以在相应的认证中心申请自己的数字证书。CA为用户颁发的数字证书中包含用户的公钥信息、权威机构的认证信息和有效期等。用户收到经数字签名的消息后,须首先验证证书的真伪,即使用证书的公钥来验证,然后利用对方的公钥来验证消息的真实性。","multi":0,"questionType":1,"answer":"C","chooseItem":["796235258025496577"],"itemList":[{"id":"796235257983553537","questionId":"796235257060806657","content":" CA的公钥","answer":0,"chooseValue":"A"},{"id":"796235258008719361","questionId":"796235257060806657","content":" 乙的私钥","answer":0,"chooseValue":"B"},{"id":"796235258025496577","questionId":"796235257060806657","content":" 甲的公钥","answer":1,"chooseValue":"C"},{"id":"796235258046468097","questionId":"796235257060806657","content":" 乙的公钥","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235019109552129","title":"要对消息明文进行加密传送,当前通常使用的加密算法是( )。","analyze":"本题考查加密算法的基本知识。<br>RSA是一种非对称加密算法,由于加密和解密的密钥不同,便于密钥管理和分发过程中,同时在用户或者机构之间进行身份认证方面有较好的应用;<br>SHA-1是一种安全散列算法,常用于对接收明文输入,产生固定长度的输出,来确保明文在传输过程中不会被篡改;<br>MD5是一种使用最为广泛的报文摘要算法;<br>RC5是一种用于对明文进行加密的算法,在加密速度和强度上,均较为合适适用于大量明文进行加密并传输。","multi":0,"questionType":1,"answer":"D","chooseItem":["796235020099407873"],"itemList":[{"id":"796235020028104705","questionId":"796235019109552129","content":" RSA","answer":0,"chooseValue":"A"},{"id":"796235020049076225","questionId":"796235019109552129","content":" SHA-1","answer":0,"chooseValue":"B"},{"id":"796235020074242049","questionId":"796235019109552129","content":" MD5","answer":0,"chooseValue":"C"},{"id":"796235020099407873","questionId":"796235019109552129","content":" RC5","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234536752009217","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>非对称加密算法中,加密和解密使用不同的密钥,下面的加密算法中(6)属于非对称加密算法。若甲、乙采用非对称密钥体系进行保密通信,甲用乙的公钥加密数据文件,乙使用(7)来对数据文件进行解密。","analyze":"本题考查加密算法的基础知识。<br> 非对称加密算法是指在加密和解密过程中,使用两个不相同的密钥,这两个密钥之间没有相互的依存关系。通常加密密钥为公钥,解密密钥为私钥。目前,使用较为广泛的非对称加密算法是RSA。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234537666367489"],"itemList":[{"id":"796234537653784577","questionId":"796234536752009217","content":" AES","answer":0,"chooseValue":"A"},{"id":"796234537666367489","questionId":"796234536752009217","content":" RSA","answer":1,"chooseValue":"B"},{"id":"796234537678950401","questionId":"796234536752009217","content":" IDEA","answer":0,"chooseValue":"C"},{"id":"796234537691533313","questionId":"796234536752009217","content":" DES","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234539847405569","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>非对称加密算法中,加密和解密使用不同的密钥,下面的加密算法中(6)属于非对称加密算法。若甲、乙采用非对称密钥体系进行保密通信,甲用乙的公钥加密数据文件,乙使用(7)来对数据文件进行解密。","analyze":"本题考查加密算法的基础知识。<br> 非对称加密算法是指在加密和解密过程中,使用两个不相同的密钥,这两个密钥之间没有相互的依存关系。通常加密密钥为公钥,解密密钥为私钥。目前,使用较为广泛的非对称加密算法是RSA。","multi":0,"questionType":1,"answer":"D","chooseItem":["796234540925341697"],"itemList":[{"id":"796234540837261313","questionId":"796234539847405569","content":" 甲的公钥","answer":0,"chooseValue":"A"},{"id":"796234540870815745","questionId":"796234539847405569","content":" 甲的私钥","answer":0,"chooseValue":"B"},{"id":"796234540895981569","questionId":"796234539847405569","content":" 乙的公钥","answer":0,"chooseValue":"C"},{"id":"796234540925341697","questionId":"796234539847405569","content":" 乙的私钥","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null}]}}