?____ ciphers use a key stream to encrypt and decrypt a plaintext message.

A. ?Block
B. ?Bit
C. ?Packet
D. ?Stream


Answer: D

Computer Science & Information Technology

You might also like to view...

Consider the list below:

January February March April May June July August September October November December What type of JList selection mode would allow the user to select March, June and July in one step? a. SINGLE_SELECTION. b. SINGLE_INTERVAL_SELECTION. c. MULTIPLE_INTERVAL_SELECTION. d. All of the above.

Computer Science & Information Technology

The piracy of music and movies is often evident on file-sharing services that use the ________ protocol.

A. Tunneling B. ICMP C. BitTorrent D. VoIP

Computer Science & Information Technology

The __________ risk treatment strategy eliminates all risk associated with an information asset by removing it from service.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A technician is not able to ping a server by the FQDN but can by the IP. Which of the following should the technician check?

A. Ensure that WINS is configured B. Ensure that the DNS is configured C. Ensure the MAC address is correct D. Ensure that the IP address is correct

Computer Science & Information Technology