A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use?
A. Hash function
B. Elliptic curve
C. Symmetric algorithm
D. Public key cryptography
Answer: C. Symmetric algorithm
Computer Science & Information Technology
You might also like to view...
MC Which of the following describes a dynamic Web page?
a) Content is generated each time a user requests a page. b) The page may not be accessed without a login and password. c) The URL is constantly changing. d) None of the above.
Computer Science & Information Technology
Bordering an image removes part of the image, both visually (on the page) and physically (the file size).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What output do you get from the following?
- item one
- item three
- item two
Computer Science & Information Technology
?The _____ property allows one to define a rectangular region through which an element's content can be viewed.
A. ?crop B. ?static C. ?auto D. ?clip
Computer Science & Information Technology