There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.

A. three B. five

C. seven D. nine


B. five

Computer Science & Information Technology

You might also like to view...

Generally, the audio CD music sampling rate is _____ and bit depth is _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It’s possible to have several methods with the same name, each operating on different types or numbers of arguments. This feature is called method ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Because the summation algorithm must visit each number in the array, no matter how the numbers are ordered, the algorithm is always linear.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Methods with identical names that have identical parameter lists but different return types are ambiguous.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology