. If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .

A. use longer keys B. use shorter keys

C. use more keys D. use less keys


A. use longer keys

Computer Science & Information Technology

You might also like to view...

A destructor has the character ____, followed by the name of the class.

A. . B. :: C. # D. ˜

Computer Science & Information Technology

Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

A. Change management B. System logs C. Asset management D. Baselining

Computer Science & Information Technology

One way that HTML changed to accommodate this new class of users was to introduce presentational  ______ and presentational attributes designed to describe how each element should be rendered by Web browsers.

A. units B. levels C. elements D. characteristics

Computer Science & Information Technology

Given a text of length T and pattern of length P, how many comparisons will be performed by the naive string search algorithm?

a. T-P b. T c. P d. T*P

Computer Science & Information Technology