Multiple Choice
__________ is the most common method used to conceal small blocks of data,such as encryption keys and hash function values,which are used in digital signatures.
A) Symmetric encryption
B) Data integrity algorithms
C) Asymmetric encryption
D) Authentication protocols
Correct Answer:

Verified
Correct Answer:
Verified
Q2: A _ takes place when one entity
Q11: A _ attack attempts to learn or
Q24: The more critical a component or service,the
Q25: In the context of network security,_ is
Q26: The connection- oriented integrity service addresses both
Q27: Symmetric encryption is used to conceal the
Q29: _ is the use of a trusted
Q30: Security services include access control,data confidentiality and
Q32: The OSI security architecture provides a systematic
Q33: _ is the protection of transmitted data