A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use?

A. Hash function
B. Elliptic curve
C. Symmetric algorithm
D. Public key cryptography


Answer: C. Symmetric algorithm

Computer Science & Information Technology

You might also like to view...

MC Which of the following describes a dynamic Web page?

a) Content is generated each time a user requests a page. b) The page may not be accessed without a login and password. c) The URL is constantly changing. d) None of the above.

Computer Science & Information Technology

Bordering an image removes part of the image, both visually (on the page) and physically (the file size).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What output do you get from the following?

  • item one
  • item three
  • item two

Computer Science & Information Technology

?The _____ property allows one to define a rectangular region through which an element's content can be viewed.

A. ?crop B. ?static C. ?auto D. ?clip

Computer Science & Information Technology