A. Pre shared secret key
B. Using key distribution center (kdc)
C. Public key-encryption
D. Symmetric key
Explanation: Pre Shared key can be compromised and either party can be suspected. Likewise KDC or symmetric key can have breach which are undesirable. Public and private key encryption is a known industry standard.
A. It is used to protect data from unauthorized access during transmission
B. It is used to ensure user authentication
C. It is used to ensure data integrity
D. It is used to ensure data corruption doesn’t happens
Explanation: Encryption doesn’t have error correction or detection facility thus cannot be used to safeguard from data corruption.
A. Data is logically ?anded’ with previous block
B. Data is logically ?ored’ with previous block
C. Data is logically ?xored’ with previous block
D. None of the mentioned
A. Aes
B. Tes
C. Triple des
D. Des
A. Two fish
B. Rc5
C. Rc4
D. Tbone
A. It creates a small flexible block of data
B. It creates a small,fixed block of data
C. It creates a encrypted block of data
D. None of the mentioned
A. 128
B. 150
C. 160
D. 112
A. 128
B. 160
C. 150
D. 112
A. Mac
B. Aes
C. Das
D. Digital-signature
A. It is used to distribute keys to everyone in world
B. It intended to reduce the risks inherent in exchanging keys
C. All of the mentioned
D. None of the mentioned