Which of the following techniques will she use to fulfill this requirement?

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network
traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key
block cipher. Which of the following techniques will she use to fulfill this requirement?

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network
traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key
block cipher. Which of the following techniques will she use to fulfill this requirement?

A.
IDEA

B.
PGP

C.
DES

D.
AES



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Cindy

Cindy

Why would DES be the correct answer with AES as one of the choices?