题目内容

Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards the gates to Hades.The name is apt because Kerberos is a(2)process,depending on a thrid—party service called the(3)to verify one computer’S identity to another and to set up (4) for a secure connection between them.Basically,Kerberos works because each computer shares a secret with the KDC,which has two components:a Kerberos authentication server and a (5)server.If a KDC doesn’t know the requested target server,it refers the authentication transaction to(6)that does.Kerberos is a network(7)protocol that allows one computer to(8)its identity to another across an insecure network through an exchange of encrypted messages.Once identity is verified,kerberos provides the two computer with (9) for a secure communication session.Kerberos authenticates the identity and encrypts their communications through (10). (4)

A. password
B. identity
C. encryption keys
D. signature

查看答案
更多问题

Now a new high-rate extension to the standard,802.11b,lets(1)networks support data rates to 1 1 M bit/see.Ratified in 1997,the-original 802.11 standard united the wireless industry by defining a(2)protocol architecture that worked with conventional upper—layer (3).Also,802.11 maintained compatibility with the three most popular radio transmission types: (4)spread spectrum,~equency-hopping spread spectrum,and infrared(5) ,this new architecture added (6)alt the medium access control(MAC)layer 2 and at the physical(PHY)(7) ,forcing(8)between the two layers in performing the critical tasks involved with initiating and maintaining wireless communications.For instance,to ensure(9)of the wireless link,MAC and PHY work together to determine if a,(10)path exists before they start a transmission. (3)

A. TCP/IP protocol stacks
B. enterprise protocol stacks
C. International Standard
D. OSI protocol stacks

Now a new high-rate extension to the standard,802.11b,lets(1)networks support data rates to 1 1 M bit/see.Ratified in 1997,the-original 802.11 standard united the wireless industry by defining a(2)protocol architecture that worked with conventional upper—layer (3).Also,802.11 maintained compatibility with the three most popular radio transmission types: (4)spread spectrum,~equency-hopping spread spectrum,and infrared(5) ,this new architecture added (6)alt the medium access control(MAC)layer 2 and at the physical(PHY)(7) ,forcing(8)between the two layers in performing the critical tasks involved with initiating and maintaining wireless communications.For instance,to ensure(9)of the wireless link,MAC and PHY work together to determine if a,(10)path exists before they start a transmission. (4)

A. direct sequence
B. indirect sequence
C. direct order
D. indirect order

Now a new high-rate extension to the standard,802.11b,lets(1)networks support data rates to 1 1 M bit/see.Ratified in 1997,the-original 802.11 standard united the wireless industry by defining a(2)protocol architecture that worked with conventional upper—layer (3).Also,802.11 maintained compatibility with the three most popular radio transmission types: (4)spread spectrum,~equency-hopping spread spectrum,and infrared(5) ,this new architecture added (6)alt the medium access control(MAC)layer 2 and at the physical(PHY)(7) ,forcing(8)between the two layers in performing the critical tasks involved with initiating and maintaining wireless communications.For instance,to ensure(9)of the wireless link,MAC and PHY work together to determine if a,(10)path exists before they start a transmission. (1)

A. VLAN
B. wireless
C. LAN
D. internet

Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards the gates to Hades.The name is apt because Kerberos is a(2)process,depending on a thrid—party service called the(3)to verify one computer’S identity to another and to set up (4) for a secure connection between them.Basically,Kerberos works because each computer shares a secret with the KDC,which has two components:a Kerberos authentication server and a (5)server.If a KDC doesn’t know the requested target server,it refers the authentication transaction to(6)that does.Kerberos is a network(7)protocol that allows one computer to(8)its identity to another across an insecure network through an exchange of encrypted messages.Once identity is verified,kerberos provides the two computer with (9) for a secure communication session.Kerberos authenticates the identity and encrypts their communications through (10). (2)

A. all-way
B. three-way
C. fully
D. two-way

答案查题题库