The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.

A. cipher feedback mode
B. counter mode
C. output feedback mode
D. electronic codebook mode

D. electronic codebook mode

Computer Science & Information Technology

You might also like to view...

A graphical representation of numeric data is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?

A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography

Computer Science & Information Technology