Two MACs that are based on the use of a block cipher mode of operation are Data Authentication Algorithm and __________ .
A. GMAC
B. DMAC
C. TMAC
D. CMAC
D. CMAC
You might also like to view...
Which of the following is not one of the three steps used to create a Visual Basic program?
(A) create the interface (B) set the properties of the objects (C) specify the methods (D) write the code
The following steps are used for which process relating to a sequential file?
1 . Open the file for Output 2 . Use Read statements to assign data in each record to program variables 3 . Use the EOF function to determine the end of the file 4 . Close the file a. creating a file b. reading the contents of a file c. modifying the contents of a file d. merging two files
Which of the following protocols uses stop-and-wait ARQ?
a. PPP b. SDLC c. BSC d. SLIP
What are the default object styles for any document?
What will be an ideal response?