A __________ is an algorithm that requires the use of a secret key.

A. DAA
B. SHA
C. GCM
D. MAC


D. MAC

Computer Science & Information Technology

You might also like to view...

With the frame value ____, a border is drawn around all four sides of the table.

A. box B. asides C. 4sides D. all

Computer Science & Information Technology

Which of the following takes precedence over multiplication?

A. division B. exponentiation C. addition D. subtraction

Computer Science & Information Technology

When you click the _____ Background button in the Adjust group on the Picture Tools Format tab, part of the photograph is marked to be removed and part of it is marked to be retained.

A. Edit B. Keep C. Merge D. Remove

Computer Science & Information Technology

When using a ring topology, a ____ can be used to connect to another network that uses the same protocol.

A. star B. central controller C. router D. bridge

Computer Science & Information Technology