The standard used for encrypting and digitally signing e-mail that contains attachments is called:
The standard used for encrypting and digitally signing e-mail that contains attachments is called:
Which of the following asymmetric algorithms is used often in Web browsers with SSL?
Which of the following asymmetric algorithms is used often in Web browsers with SSL?
Which protocol is used for setting up secured channels between two devices, typically in VPNs?
Which protocol is used for setting up secured channels between two devices, typically in VPNs?
What technology is used when all the data in a communication path is encrypted including the header, trailer,
What technology is used when all the data in a communication path is encrypted including the header, trailer, and routing information?
what kind of attack is this?
If an attacker intercepts a public key and forwards his own key to the receiver, what kind of attack is this?
what function?
The Diffie-Hellman algorithm performs what function?
Which IPSec protocol provides confidentiality and integrity?
Which IPSec protocol provides confidentiality and integrity?
Which is not true of a good one-way hashing function?
Which is not true of a good one-way hashing function?
what algorithm?
Rivest, Shamir, and Adleman developed what algorithm?
Which of the following is not a characteristic of a strong stream cipher?
Which of the following is not a characteristic of a strong stream cipher?