Kerberos uses the _______ encryption algorithm
A. AES B. PKI
C. DES D. TGS
C
You might also like to view...
Linda is developing a survey questionnaire. She wants to avoid potential sources of threats to validity and reliability of the survey instrument, and she is trying to make a research-based decision (aka, evidence-based practice). Which one of the following is NOT an evidence-based practice?
a. Do not include both positively- and negatively-worded items in the survey. b. Offer an ‘I don’t know’ or ‘Not applicable’ option when using the Likert scale. c. Use a 4-point Likert scale when needing to use interval scale data. d. Omit a midpoint when respondents are unfamiliar with the survey topic.
When a company tries to constantly develop the "next new thing," it is trying to establish ________ leadership as a source of differentiation.
A. price B. service C. innovative D. image E. personnel
Online educational programs offered by the University of Phoenix are an example of _____________
a. revolutionary products/services b. collective products/services c. additional services d. supplementary services e. core products/services
Under a closed shop agreement, an employer agrees to hire only employees who are already members of a union
Indicate whether the statement is true or false