The key algorithmic ingredients of _________ are the AES encryption algorithm, the CTR mode of operation, and the CMAC authentication algorithm.

A. DAA
B. GCM
C. CCM
D. CMA

C. CCM

Computer Science & Information Technology

You might also like to view...

A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?

A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT

Computer Science & Information Technology

If the field modifier ______ is specified in a method definition, the method cannot be overridden by a subclass.

a) public b) protected c) final d) abstract

Computer Science & Information Technology