An administrator would like to utilize encryption that has comparable speed and strength to the AES cipher without using AES itself. The cipher should be able to operate in the same modes as AES and utilize the same minimum bit strength. Which of the following algorithms should the administrator select?

A. RC4
B. Rijndael
C. SHA
D. TwoFish
E. 3DES


Answer: A. RC4

Computer Science & Information Technology

You might also like to view...

The __________ incorporates routines that allow the user or programmer to create, delete, modify, and manipulate files by name.

a. file system b. shell c. user interface d. IOCS

Computer Science & Information Technology

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack

a. stealth b. backdoor c. scareware d. denial-of-service

Computer Science & Information Technology

In order to delete a building block, a document must be:

A) open. B) read-only. C) closed. D) saved.

Computer Science & Information Technology

Which of the following enables a computer or device that does not have built-in networking capability to access a network?

A. hub B. packet C. NIC D. router

Computer Science & Information Technology