Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers)
a. TKIP
b. AES
c. ECC
d. RSA
Answer:
a....
You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
a. Hashing...
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than...
Which of the following are asymmetric encryption algorithms? (Select the three best answers)
Which of the following are asymmetric encryption algorithms? (Select the three best answers)
a. RC4
b. DES
c. AES
d. ECC
e. Diffie-Hellman
f. RSA
g....
Which of the following are symmetric encryption algorithms? (Select the four best answers)
Which of the following are symmetric encryption algorithms? (Select the four best answers)
a. RC4
b. DES
c. AES
d. ECC
e. Diffie-Hellman
f. RSA
g....
Which of the following is the weakest encryption type?
Which of the following is the weakest encryption type?
a. DES
b. AES
c. RSA
d. SHA
Answer: a. D...
A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
a. Recipient's...
Subscribe to:
Posts (Atom)