Confidentiality can be provided by performing message encryption __________ the MAC algorithm.
A. before
B. before or after
C. after
D. during
B. before or after
Computer Science & Information Technology
You might also like to view...
In a Microsoft Word document the default margins are ________ on each side
A) 2" B) 0.5" C) 1.5" D) 1"
Computer Science & Information Technology
You close a solution using the ____ option on the File menu.
A. Close Solution B. End Solution C. Close Project D. End Project
Computer Science & Information Technology