There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.

A. three B. five

C. seven D. nine


B. five

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. Overloaded methods are often used to perform similar operations on different types of data. b. When the compiler encounters a method call, it attempts to locate a method declaration with a name and parameters that are compatible with the argument types in the method call. c. Both a) and b) are true. d. Neither a) nor b) is true.

Computer Science & Information Technology

____ means that you can place one repetition structure entirely within another repetition structure.

A. Encasing B. Subordinating C. Nesting D. Folding

Computer Science & Information Technology

Which of the following refers to organizations that validate adherence to certain PCI DSS requirements by performing vulnerability scans of Internet-facing environments of merchants and service providers?

A) Qualified Security Assessors (QSAs) B) Internal Security Assessors (ISAs) C) Approved Scanning Vendors (ASVs) D) None of the above

Computer Science & Information Technology

Which of the statements below will create the String r1 = "JAVA: How to Program"?

Consider the statements below: String a = "JAVA: "; String b = "How to "; String c = "Program"; a. String r1 = c.concat(b.concat(a)); b. String r1 = a.concat(b.concat(c)); c. String r1 = b.concat(c.concat(a)); d. String r1 = c.concat(c.concat(b));

Computer Science & Information Technology