Drag the items from the left that are part of a secure network lifecycle and drop them in the spaces on the right.
what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?