Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply. A. Transposition cipher B. Message Authentication Code C. Stream cipher D. Block cipher Suggested Answer: BCD This question is in GISF exam For getting GIAC Information Security Fundamentals (GISF) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by GIAC. Trademarks, certification & product names are used for reference only and belong to GIAC.
Please login or Register to submit your answer