In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and deception key are (75)

题库:计算机网络管理员 类型:最佳选择题 时间:2017-07-03 13:34:57 免费下载:《单项选择》Word试卷

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and deception key are (75)

A.synchronous
B.Asynchronous
C.symmetric
D.asymmetric

In the following essay, each blank has four choices. Choose the most suitable on

;

微信扫码获取答案解析
下载APP查看答案解析