The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.
A) ?linear ?
B) block
C) ?permutation
D) ?stream
B) block
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT an available interface for CD and DVD drives?
A) SCSI B) IDE C) USB D) MIDI
Computer Science & Information Technology
The Border button and the Shading button are located in the _____ group on the HOME tab.
A. Editing B. Illustrations C. Paragraph D. Preview
Computer Science & Information Technology