Which of the following techniques will he use to fulfill this requirement?

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic.
The specific requirement for the encryption algorithm is that it must be a symmetric key block
cipher. Which of the following techniques will he use to fulfill this requirement?

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic.
The specific requirement for the encryption algorithm is that it must be a symmetric key block
cipher. Which of the following techniques will he use to fulfill this requirement?

A.
AES

B.
DES

C.
IDEA

D.
PGP

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *