Which of the following is the most common public-key encryption algorithm?

DES
JSA
AES
RSA


RSA

Computer Science & Information Technology

You might also like to view...

Many people who create podcasts use a ____ application to post and archive each episode of a podcast.

A. newsgroup B. blogging C. wiki D. Web feed

Computer Science & Information Technology

The standard DACL for a package object assigns read permissions to what group by default?

A. Domain Admins B. Authenticated Users C. Everyone D. Domain Users

Computer Science & Information Technology

Regarding the use of Group Policy, what statement is NOT accurate?

a. policies can be applied to a computer b. all policies are applied before the logon screen appears c. Group Policy is available in Windows Professional edition d. you can set the QoS level for an application using Group Policy

Computer Science & Information Technology

What are the two different types of Storage Area Network system?

A. CIFS and SMB B. Fibre Channel and iSCSI C. iSCSI and NFSv3 D. NFSv3 and Samba

Computer Science & Information Technology