搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

Data encryption and decryption occurs at which layer of the OSI model?()

A、Transport

B、Presentation

C、Session

D、Application

更多“Data encryption and decryption occurs at which layer of the OSI model?()”相关的问题
第1题

A、The data is decrypted during SORT and JOIN operations.  B、The data remains encrypted when it is read into memory.  C、The data remains encrypted when it is stored in the redo logs.  D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.  

点击查看答案
第2题

A、Use Data Pump to transfer the existing data to a new encrypted tablespace  B、Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespace  C、Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespace  D、Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespace  E、Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted  

点击查看答案
第3题

A、 The data is decrypted during SORT and JOIN operations.  B、 The data remains encrypted when it is read into memory.  C、 The data remains encrypted when it is stored in the redo logs.  D、 The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.  

点击查看答案
第4题

A、They use the same key for encryptionand decryption of data.  B、They use different keys for decryption but the same key for encryption of data.  C、They use different keys for encryptionand decryption of data.  D、They use the same key for decryption but different keys for encryption of data.  

点击查看答案
第5题

A、The same key is used for encryption and decryption.  B、It is commonly used to create digital certificate signatures.  C、It uses two keys: one for encryption and a different key for decryption.  D、An attacker can decrypt data if the attacker captures the key used for encryption.  

点击查看答案
第6题

A、The same key is used for encryption and decryption.  B、It is commonly used to create digital certificate signatures.  C、It uses two keys: one for encryption and a different key for decryption.  D、An attacker can decrypt data if the attacker captures the key used for encryption.  

点击查看答案
第7题

A、An error will occur.  B、Data passed between the client and the server is encrypted.  C、User IDs and passwords are passed to the server unencrypted.  D、User IDs and passwords are encrypted before they are passed to the server.  

点击查看答案
第9题

A、The amount of undo retained is user controlled.  B、SecureFile LOBs can be used only for nonpartitioned tables.  C、Fragmentation is minimized by using variable-sized chunks dynamically.  D、SecureFile encryption allows for random reads and writes of the encrypted data.  E、It automatically detects duplicate LOB data and conserves space by storing only one copy.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服