There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.

A. three B. five

C. seven D. nine

B. five

Computer Science & Information Technology

You might also like to view...

A(n) __________ center is where several corporations lease space and equipment to hold and protect their data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which type of file does the SharedPreferences object save data to?

A. SRC B. RES C. XML D. DAT

Computer Science & Information Technology