How many possible keys exist in a cryptographic algorithm that uses 6-bit encryption keys?

A. 12
B. 16
C. 32
D. 64


Answer: D. 64

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A test using the isupper function will return false if the argument is an uppercase character. 2. The isdigit function will return true if the argument is a digit between 0 and 9. 3. When using the strcat function you must be careful not to overwrite the bounds of an array. 4. The itoa function is similar to atoi but it works in reverse. 5. The C++ compiler performs strict array bounds checking when it encounters an array of characters.

Computer Science & Information Technology

Each physical device in UNIX is identified by a minor device number, a major device number, and a contact address.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you catch an Exception object, you can call ____ to display a list of methods in the call stack so you can determine the location of the statement that caused the exception.

A. callStackTrace() B. printStackTrace() C. whereIs() D. printStack()

Computer Science & Information Technology

A goal of NAC is which of the following?

a. Map internal private addresses to external b. public addresses c. Reduce zero-day attacks d. Distribute IP address configurations e. Reduce social engineering threats

Computer Science & Information Technology