An administrator would like to utilize encryption that has comparable speed and strength to the AES cipher without using AES itself. The cipher should be able to operate in the same modes as AES and utilize the same minimum bit strength. Which of the following algorithms should the administrator select?
A. RC4
B. Rijndael
C. SHA
D. TwoFish
E. 3DES
Answer: A. RC4
Computer Science & Information Technology
You might also like to view...
The __________ incorporates routines that allow the user or programmer to create, delete, modify, and manipulate files by name.
a. file system b. shell c. user interface d. IOCS
Computer Science & Information Technology
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack
a. stealth b. backdoor c. scareware d. denial-of-service
Computer Science & Information Technology
In order to delete a building block, a document must be:
A) open. B) read-only. C) closed. D) saved.
Computer Science & Information Technology
Which of the following enables a computer or device that does not have built-in networking capability to access a network?
A. hub B. packet C. NIC D. router
Computer Science & Information Technology