A security technician wants to improve the strength of a weak key by making it more secure against brute force attacks. Which of the following would achieve this?

A. Blowfish
B. Key stretching
C. Key escrow
D. Recovery agent


Answer: A. Blowfish

Computer Science & Information Technology

You might also like to view...

The Digital Millennium Copyright Act of 1998 (DCMA) provides for which of the following:

a. Civil liability for transmitting copyrighted materials online. b. Criminal penalties for circumvention of copyright protection systems. c. Has as its primary focus the criminalization of technologies that secure digital copies of music, videos, and literary works. d. All of the above.

Computer Science & Information Technology

You can expand and collapse the ribbon by pressing Alt+F1

Indicate whether the statement is true or false.

Computer Science & Information Technology

What material is recommended for secure storage containers and cabinets?

a. Gypsum b. Steel c. Wood d. Expanded metal

Computer Science & Information Technology

Many Web sites are created at a width of ____ pixels, which makes them optimized to display on monitors set to a screen resolution of 1024 x 768 and higher.

A. 768 B. 955 C. 1022 D. 1024

Computer Science & Information Technology