Which of the following is not a symmetric-key encryption algorithm?

a. DES
b. Blowfish
c. AES
d. RSA


Answer: d. RSA

Computer Science & Information Technology

You might also like to view...

____ ensures that all of the people involved in the continuity process understand their assigned roles.

A. Continuity management B. Disaster management C. Recovery management D. Enterprise management

Computer Science & Information Technology

Big – Oh notation establishes a(n) ____________ on a growth function

a) lower bound b) upper bound c) average (or mean) bound d) both a) and b) e) all of a), b), and c)

Computer Science & Information Technology

______________________ is achieved when neither party can plausibly deny its participation in message exchanges.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When configuring application restrictions, you can set user-specific policies that prevent users from accessing programs needed only by other users of the same computer

Indicate whether the statement is true or false

Computer Science & Information Technology