ISC Exam Questions

Which of the following techniques will she use to fulfill this requirement?

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network
traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key
block cipher. Which of the following techniques will she use to fulfill this requirement?

A.
IDEA

B.
PGP

C.
DES

D.
AES