Multiple Choice
An attacker is able to decrypt a message by finding a key that was not securely stored and should have been revoked.The is the result of
A) Poor key management
B) A weak key
C) A weak algorithm
D) A small keyspace
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q39: Keeping a copy of the encryption key
Q40: A _ is when a hash algorithm
Q41: A(n)_ is a step-by-step,recursive computational procedure for
Q42: A corporate spy copies proprietary information into
Q43: Cryptographic algorithms are used for all of
Q45: Keyspace refers to<br>A)The location where keys are
Q46: Hashing algorithms can be compromised<br>A)By a collision
Q47: The ROT13 cipher is an example of
Q48: The strength of a symmetric encryption is
Q49: What application of encryption verifies that a