Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

A. DES
B. AES-256
C. Triple DES
D. IDEA


Answer: B

Computer Science & Information Technology

You might also like to view...

When do you use the function c_str?

a) When you are reading the file name using >> b) When the file contains strings c) When the file name contains a blank d) When the file contains C-style strings

Computer Science & Information Technology

The advantage of participating in ________ e-commerce is that it enables individuals to do business with anyone, including businesses through blogs, advertising, and other websites

Fill in the blank(s) with correct word

Computer Science & Information Technology

Detailed application specifications can be developed before or after selecting the hardware and software for an information system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To change the width of a column in a table, from the Layout tab, in the Cell Size group, click in the:

A. Alignment box B. Options box C. Width box

Computer Science & Information Technology