The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.

A) ?linear ?
B) block
C) ?permutation
D) ?stream

B) block

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT an available interface for CD and DVD drives?

A) SCSI B) IDE C) USB D) MIDI

Computer Science & Information Technology

The Border button and the Shading button are located in the _____ group on the HOME tab.

A. Editing B. Illustrations C. Paragraph D. Preview

Computer Science & Information Technology