Which of the following is not a symmetric-key encryption algorithm?
a. DES
b. Blowfish
c. AES
d. RSA
Answer: d. RSA
You might also like to view...
____ ensures that all of the people involved in the continuity process understand their assigned roles.
A. Continuity management B. Disaster management C. Recovery management D. Enterprise management
Big – Oh notation establishes a(n) ____________ on a growth function
a) lower bound b) upper bound c) average (or mean) bound d) both a) and b) e) all of a), b), and c)
______________________ is achieved when neither party can plausibly deny its participation in message exchanges.
Fill in the blank(s) with the appropriate word(s).
When configuring application restrictions, you can set user-specific policies that prevent users from accessing programs needed only by other users of the same computer
Indicate whether the statement is true or false