____ is a symmetric key-encryption technique that will replace the commonly used DES standard.

A. AES
B. RC2
C. IDEA
D. Blowfish


Answer: A

Computer Science & Information Technology

You might also like to view...

Hiding the Create tab will take one step towards securing any VBA or macros in the database

Indicate whether the statement is true or false

Computer Science & Information Technology

If you are sharing a computer with others and have added building blocks, you should restore Word to its ________, or original settings

Fill in the blank(s) with correct word

Computer Science & Information Technology

Define an edge router, including both its role and the larger system within which it exists.

What will be an ideal response?

Computer Science & Information Technology

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.

a. cybersquatting. b. phishing. c. an online imposture. d. cache poisoning. e. a distributed denial of request.

Computer Science & Information Technology