. If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .
A. use longer keys B. use shorter keys
C. use more keys D. use less keys
A. use longer keys
Computer Science & Information Technology
You might also like to view...
_________ control controls how particular services are used.
A. Service B. Behavior C. User D. Direction
Computer Science & Information Technology
Which of the following statements is false?
a. An object's attributes are specified as part of the object’s class. b. A bank-account object would likely have a balance attribute that represents the amount of money in the account. c. Each bank-account object knows the balance in the account it represents, but not the balances of the other accounts in the bank. d. Attributes are specified by the class’s methods.
Computer Science & Information Technology