____ is a method for secure key exchange over an insecure channel based on the nature of photons.?
A. ?Skipjack
B. ?Quantum cryptography
C. ?RC4
D. ?IDEA
Answer: B
You might also like to view...
Combining two or more cells in a Quick Table is completed by clicking the ________ button
A) Split Cells B) Merge Cells C) Banded Columns D) Autofit
There are several different categories of privileged information. Which of the following is not an example of privileged information?
a. Notes taken by an investigator at the scene of an investigation b. Doctor/Patient privilege c. Work Product d. Protected intellectual property
Data can be presented in customized and useful ways different from tables and queries by using a Simple ____________________.
Fill in the blank(s) with the appropriate word(s).
Online __________ is/are two or more online personas with the same name or user name.
A. sockpuppets B. doppelgangers C. impersonation D. cyberbullying