"Release of message contents to any person or process not possessing the appropriate cryptographic key" is a __________ attack.
A. content modification
B. source repudiation
C. disclosure
D. sequence modification
C. disclosure
You might also like to view...
Which of the following statements are correct for recursion?
a. Recursion is available only in the C and C++ languages. b. Recursion is available in all programming languages. c. Recursion is available in most modern programming languages, including C++. d. Recursion is a preprocessor technique e. Recursion, if used with care can be a useful programming technique.
__________ increases performance by holding information in memory (as opposed to on disk) in case the information is needed a second time.
a. Caching b. Multitasking c. The virtual memory manager d. Buffering
Which of the following statements is false?
a. References to interface types do not have access to method toString. b. Method toString can be invoked implicitly on any object. c. With inheritance, classes and their inherited classes tend to be very similar. d. Dramatically different classes can often meaningfully implement the same interface.
The accompanying figure illustrates the _____ slide layout.
A. Title Slide B. Title and Content C. Title Only D. Comparison