A security technician wants to improve the strength of a weak key by making it more secure against brute force attacks. Which of the following would achieve this?

A. Blowfish
B. Key stretching
C. Key escrow
D. Recovery agent

Answer: A. Blowfish

Computer Science & Information Technology

You might also like to view...

To display correctly, a query should select records from related tables

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following are the three major characteristics of WANS?

a. Use serial connections b. Require the services of telephone companies c. Connect remote devices that are on the same LAN d. Connect devices on remote LANs e. Use the Internet rather than a carrier

Computer Science & Information Technology