ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 347 - H13-624 discussion

Report
Export

What is wrong about the AK/SK authentication process among the following options:

A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
Answers
A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated name.
Answers
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated name.
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
Answers
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.Formula, CPU used, number of node connections
Answers
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.Formula, CPU used, number of node connections
Suggested answer: A
asked 18/09/2024
Ruud God
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first