In the first instance of multiple encryption plaintext is converted to __________ using the encryption algorithm.
A. block cipher
B. ciphertext
C. S-AES mode
D. Triple DES
B. ciphertext
You might also like to view...
In the VBA statement: MsgBox("Do you really want to quit Access?",4,"Confirm please")=6, what does the third argument define?
A) The text inside the message box B) The text in the message title bar C) This statement only has two arguments D) The number of lines to insert
A security administrator determined that users within the company are installing unapproved software. Company policy dictates that only certain applications may be installed or ran on the user's computers without exception.Which of the following should the administrator do to prevent all unapproved software from running on the user's computer?
A. Deploy antivirus software and configure it to detect and remove pirated software B. Configure the firewall to prevent the downloading of executable files C. Create an application whitelist and use OS controls to enforce it D. Prevent users from running as administrator so they cannot install software.