A brute force attack against an encryption system:

a. tries to gain access by trying every possible key
b. is called RC4
c. is also known as 3DES
d. always uses the Rijndael algorithm
e. is part of the Advanced Encyrption Standard


Answer: a. tries to gain access by trying every possible key

Computer Science & Information Technology

You might also like to view...

By default, a browser displays each _________ element on a new line.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following are examples of Formatting text?

A) Boldfacing the text B) Changing the font C) Changing the font size D) All of the above

Computer Science & Information Technology

?You can switch to Notes Page view to display each slide in the bottom half of the presentation window and the speaker notes for that slide in the top half.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The computers and devices on a network are also known as _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology