A Security Officer on a military base needs to encrypt several smart phones that will be going into the field.Which of the following encryption solutions should be deployed in this situation?

A. Elliptic curve
B. One-time pad
C. 3DES
D. AES-256


Answer: D. AES-256

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1Brenda has finished constructing her new database and populating it with data, and the time has come to begin to test out queries on her new database. She has asked you for some quick tips on the finer points of database queries. Brenda wants to search for records with “Jan” in the Firstname field but wants to exclude “Jen” or “Jon” in the query. Which of the following entries will yield the correct results?

A. J[!eo]n B. J[e,o]n C. J[eo]n D. J?n

Computer Science & Information Technology

Buffer overflows can be divided into two categories: _________________________ and heap overflow.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ numbering system uses base 2

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which user's computer will likely have the shortest useful life?

A) a user who primarily uses basic word-processing features B) a frequent user but not with a lot of special needs C) a user who does a lot of video editing and image processing D) a user who primarily reads and send e-mail

Computer Science & Information Technology