Multiple Choice
Match each item with a statement below.
-The use of random data alongside plaintext as an input to a hashing function so that the output is unique
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer:

Verified
Correct Answer:
Verified
Q24: What configuration mode allows a Cisco administrator
Q25: Match each item with a statement below.<br>-Indicates
Q26: Match each item with a statement below.<br>-Handle
Q27: What are the interfaces in a Cisco
Q28: Match each item with a statement below.<br>-Internal
Q30: What is an encryption algorithm?
Q31: Which type of Cisco access lists can
Q32: Which IDS system uses a baseline of
Q34: Match each item with a statement below.<br>-IDS
Q76: What is a digital signature?