__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.
A. Code
B. An algorithm
C. A key
D. Work factor
Answer: D
You might also like to view...
When removing an element from a binary search tree, we must always ______________________.
a) make sure that the new tree is a binary search tree b) build a new tree c) find its inorder successor d) remove all of its children e) An element should never be removed from a binary search tree.
Which of the following best describes a hashtag?
A. Another term for meta data. B. An online encyclopedia. C. A word or phrase that creates an easily searched group of related messages. D. An online journal or diary.
COGNITIVE ASSESSMENT You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
A. worm B. rootkit C. trojan horse D. virus
Ann, a user, has recently installed a new Blu-Ray ROM in her desktop computer. The computer recognizes the device as a DVD-ROM. Which of the following actions would enable the system to recognize the device as a Blu-Ray device?
A. The operating system must be upgraded to Windows Ultimate. B. Flash the system's motherboard CMOS. C. Upgrade to the latest Windows Media Player. D. Install the manufacturer's drivers for the OS.