A Security Officer on a military base needs to encrypt several smart phones that will be going into the field.Which of the following encryption solutions should be deployed in this situation?
A. Elliptic curve
B. One-time pad
C. 3DES
D. AES-256
Answer: D. AES-256
You might also like to view...
Case-Based Critical Thinking QuestionsCase 1Brenda has finished constructing her new database and populating it with data, and the time has come to begin to test out queries on her new database. She has asked you for some quick tips on the finer points of database queries. Brenda wants to search for records with “Jan” in the Firstname field but wants to exclude “Jen” or “Jon” in the query. Which of the following entries will yield the correct results?
A. J[!eo]n B. J[e,o]n C. J[eo]n D. J?n
Buffer overflows can be divided into two categories: _________________________ and heap overflow.
Fill in the blank(s) with the appropriate word(s).
The ________ numbering system uses base 2
Fill in the blank(s) with correct word
Which user's computer will likely have the shortest useful life?
A) a user who primarily uses basic word-processing features B) a frequent user but not with a lot of special needs C) a user who does a lot of video editing and image processing D) a user who primarily reads and send e-mail