In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and deception key are (75)
题库:计算机网络管理员
类型:最佳选择题
时间:2017-07-03 13:34:57
免费下载:《单项选择》Word试卷
In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and deception key are (75)
A.synchronous
B.Asynchronous
C.symmetric
D.asymmetric
;