List of questions
Related questions
Question 211 - CISSP-ISSAP discussion
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
A.
Block cipher
B.
Stream cipher
C.
Transposition cipher
D.
Message Authentication Code
Your answer:
0 comments
Sorted by
Leave a comment first