Which of the following is true about encryption algorithms?

A. their strength is tied to their key length
B. not vulnerable to brute force attacks
C. block ciphers encrypt one bit at a time
D. asymmetric algorithms use a single key


Answer: A

Computer Science & Information Technology

You might also like to view...

A form can contain more than one subform

Indicate whether the statement is true or false

Computer Science & Information Technology

When you add a new tile to your Windows 8 screen, where is it added?

A) Pinned to the Charms bar B) Pinned to the Jump List C) At the end of the tiles D) At the beginning of the tiles

Computer Science & Information Technology

Which two cables could attach to a mini-DIN connector? (Select two.)

A) Video B) Audio C) USB D) Network E) Mouse

Computer Science & Information Technology

The and tags are used to mark the start and end of each ____________________________ in a table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology