Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography?

Which of the following techniques can be used by an administrator while working with the
symmetric encryption cryptography? Each correct answer represents a complete solution. Choose
all that apply.

Which of the following techniques can be used by an administrator while working with the
symmetric encryption cryptography? Each correct answer represents a complete solution. Choose
all that apply.

A.
Block cipher

B.
Stream cipher

C.
Transposition cipher

D.
Message Authentication Code



Leave a Reply 0

Your email address will not be published. Required fields are marked *