Multiple Choice
Match each item with a statement below.
-Uses a single key to encrypt and decrypt data
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q14: What type of function is being performed
Q15: What type of IDS/IPS is used to
Q16: What type of an IDS is being
Q17: What specific type of tools can assist
Q18: How does public key infrastructure work?
Q20: What are the advantages and disadvantages of
Q21: Match each item with a statement below.<br>-Inspects
Q22: What is a Unified Threat Management device?
Q23: How do "Network-based IDSs/IPSs" monitor activity on
Q24: What configuration mode allows a Cisco administrator