The length of an MD5 message digest is:
The length of an MD5 message digest is:
Which of the following is not a proprietary encryption algorithm?
Which of the following is not a proprietary encryption algorithm?
A public key infrastructure (PKI) does not include:
A public key infrastructure (PKI) does not include:
which is not a weakness of symmetric cryptography?
Of the following, which is not a weakness of symmetric cryptography?
Which of the following characteristics are part of the DES encryption scheme?
Which of the following characteristics are part of the DES encryption scheme?
The most secure form of triple-DES encryption is:
The most secure form of triple-DES encryption is:
A _____________________ binds a subject name to a public key value.
A _____________________ binds a subject name to a public key value.
A digital certificate:
A digital certificate:
which of the following is less likely to be used?
When creating a VPN, which of the following is less likely to be used?
Which of the following is included in an X.509-certificate?
Which of the following is included in an X.509-certificate?