There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.
A. three B. five
C. seven D. nine
B. five
Computer Science & Information Technology
You might also like to view...
A(n) __________ center is where several corporations lease space and equipment to hold and protect their data.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which type of file does the SharedPreferences object save data to?
A. SRC B. RES C. XML D. DAT
Computer Science & Information Technology