Confidentiality can be provided by performing message encryption __________ the MAC algorithm.

A. before
B. before or after
C. after
D. during

B. before or after

Computer Science & Information Technology

You might also like to view...

In a Microsoft Word document the default margins are ________ on each side

A) 2" B) 0.5" C) 1.5" D) 1"

Computer Science & Information Technology

You close a solution using the ____ option on the File menu.

A. Close Solution B. End Solution C. Close Project D. End Project

Computer Science & Information Technology