A brute force attack against an encryption system:
a. tries to gain access by trying every possible key
b. is called RC4
c. is also known as 3DES
d. always uses the Rijndael algorithm
e. is part of the Advanced Encyrption Standard
Answer: a. tries to gain access by trying every possible key
You might also like to view...
By default, a browser displays each _________ element on a new line.
Fill in the blank(s) with the appropriate word(s).
Which of the following are examples of Formatting text?
A) Boldfacing the text B) Changing the font C) Changing the font size D) All of the above
?You can switch to Notes Page view to display each slide in the bottom half of the presentation window and the speaker notes for that slide in the top half.
Answer the following statement true (T) or false (F)
The computers and devices on a network are also known as _____.
Fill in the blank(s) with the appropriate word(s).