List of questions
Related questions
Question 347 - H13-624 discussion
What is wrong about the AK/SK authentication process among the following options:
A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated name.
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.Formula, CPU used, number of node connections
Your answer:
0 comments
Sorted by
Leave a comment first