A security technician wants to improve the strength of a weak key by making it more secure against brute force attacks. Which of the following would achieve this?
A. Blowfish
B. Key stretching
C. Key escrow
D. Recovery agent
Answer: A. Blowfish
You might also like to view...
The Digital Millennium Copyright Act of 1998 (DCMA) provides for which of the following:
a. Civil liability for transmitting copyrighted materials online. b. Criminal penalties for circumvention of copyright protection systems. c. Has as its primary focus the criminalization of technologies that secure digital copies of music, videos, and literary works. d. All of the above.
You can expand and collapse the ribbon by pressing Alt+F1
Indicate whether the statement is true or false.
What material is recommended for secure storage containers and cabinets?
a. Gypsum b. Steel c. Wood d. Expanded metal
Many Web sites are created at a width of ____ pixels, which makes them optimized to display on monitors set to a screen resolution of 1024 x 768 and higher.
A. 768 B. 955 C. 1022 D. 1024