A security technician wants to improve the strength of a weak key by making it more secure against brute force attacks. Which of the following would achieve this?
A. Blowfish
B. Key stretching
C. Key escrow
D. Recovery agent
Answer: A. Blowfish
Computer Science & Information Technology
You might also like to view...
To display correctly, a query should select records from related tables
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following are the three major characteristics of WANS?
a. Use serial connections b. Require the services of telephone companies c. Connect remote devices that are on the same LAN d. Connect devices on remote LANs e. Use the Internet rather than a carrier
Computer Science & Information Technology