Which of the following is a range of allowable values that is used to generate an encryption key?
A. algorithm area
B. key range
C. keyspace
D. keyarea
Answer: C
Computer Science & Information Technology
You might also like to view...
Lines, arrows, stars, banners, ovals, and rectangles are examples of ________ that are used to illustrate an idea, a process, or a workflow
A) clips B) shapes C) crops D) headers
Computer Science & Information Technology
One of the most important documents you will need as support for the disaster recovery team is the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology