Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply. A. Block cipher B. Stream cipher C. Transposition cipher D. Message Authentication Code Suggested Answer: ABD This question is in CISSP-ISSAP Information Systems Security Architecture Professional Exam For getting Information Systems Security Architecture Professional (CISSP-ISSAP) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISC. Trademarks, certification & product names are used for reference only and belong to ISC. The website does not contain actual questions and answers from ISC's Certification Exams.
Please login or Register to submit your answer