列表

详情


Secure Shell(SSH) is a cryptographic network protocol for operating network services securely over an ( 1 ) network, Typical applications include remotecommand-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the ( 2 ) model,which means that the connection in established by the SSH client connecting to the SSH server.The SSH client drives the connection setup process and uses public key cryptography to verify the ( 3 ) of the SSH server. After the setup phase the SSH protocol uses strong ( 4 ) encryption and hashing algorithms to ensure the privacy and integnity of the data that is exchanged between the client and server. There are serveral options that can be used for user authentication.The most common ones are passwords and ( 5 )key authentication.

第 1 问

A. encrypted

B. unsecured

C. authorized

D. unauthorized

第 2 问

A. C/S

B. B/S

C. P2P

D. distributed

第 3 问

A. capacity

B. services

C. applications

D. identity

第 4 问

A. dynamic

B. random

C. symmetric

D. asymmetric

第 5 问

A. public

B. private

C. static

D. dynamic

参考答案: B A D C A

详细解析:

安全外壳(SSH)是一种加密网络协议,用于在不安全的网络上安全地运行网络服务。典型的应用程序包括远程命令行,登录和远程命令执行,任何网络服务都可以使用SSH进行安全保护。 该协议在C / S模式下工作,这意味着SSH客户端建立连接到SSH服务器。SSH客户端驱动连接建立过程,并使用公共密钥加密技术来验证SSH服务器的身份。 在设置阶段之后,SSH协议使用强大的非对称加密和哈希算法来确保在客户端和服务器之间交换的数据的私密性和完整性。 有一些服务器选项可用于用户身份验证。最常见的选项是密码和公钥身份验证。


答案选项:

A.加密            B.无抵押                C.授权                D.未经授权

A.C / S            B.B / S                   C.P2P                    D.分布式

A.容量              B.服务                  C.应用                  D.身份

A.动态            B.随机                    C.对称                    D.不对称





上一题