Which of the following is a stream cipher?
A. RC4
B. Blowfish
C. Twofish
D. RC5
E. RC6
A
Explanation: RC4 is a stream cipher. All the other options are block ciphers.
You might also like to view...
A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
A. incident B. disaster C. crisis D. recovery
Like 802.11g, ______________ WAPs can run in the 2.4-GHz ISM band, supporting earlier, slower 802.11b/g devices.
Fill in the blank(s) with the appropriate word(s).
Java 2 provides access controls based on where the code originated from and who signed the code.
Answer the following statement true (T) or false (F)
The voltages that represent binary numbers are applied to a(n) ________ , which is a solid crystalline device that converts electricity to a narrow beam of light of one color
A) attenuator B) laser diode C) photo detector D) repeater