1- An asset of the system is destroyed of becomes

advertisement
1- Generic name for the collection of tools designed to protect data and to thwart
hackers.
a- Computer Security
c- Internet Security
b- Network Security
d- None of them
2- Measures to protect data during their transmission.
a- Computer Security
c- Internet Security
b- Network Security
d- None of them
3- Measures to protect data during their transmission over a collection of
interconnected networks
a- Computer Security
c- Internet Security
b- Network Security
d- None of them
4- An asset of the system is destroyed of becomes unavailable or unusable. This is an
attack on availability.
a- Interception
c- Fabrication
e- None of them
b- Modification
d- Interruption.
5- An unauthorized party gains access to an asset. This is an attack on confidentiality.
a- Interception
c- Fabrication
e- None of them
b- Modification
d- Interruption.
6- An unauthorized party not only gains access but tampers with an asset. This is an
attack on integrity.
a- Interception
c- Fabrication
e- None of them
b- Modification
d- Interruption.
7- An unauthorized party inserts counterfeit objects into the system. This is an attack
on authentication.
a- Interception
c- Fabrication
e- None of them
b- Modification
d- Interruption.
8- Release of message contents: for a telephone conversion, an electronic mail
message, and a transferred file are subject to which threats.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
b- Passive Attack (Threat)
d- Brute- Force Attack
e- None of them
9- Masquerade takes place when one entity pretends to be a different entity is subject
to which threats.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
10- Replay: involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect is subject to which threats.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
11- Modification of messages: means that some portion of a legitimate message is
altered, or that messages are delayed or reordered, to produce an unauthorized effect
is subject to which threats.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
12- Denial of service: prevents or inhibits the normal use or management of
communications facilities is subject to which threats.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
13- The attacker only monitors the traffic attacking the confidentiality of the data.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
14- The adversary attempts to alter the transmission attacking data integrity,
confidentiality, and authentication.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them
b- Passive Attack (Threat)
d- Brute- Force Attack
15- Try every possible key on the ciphertext until an intelligible translation into a
plaintext is obtained.
a- Active Attack (Threat)
c- Active and Passive Attacks (Threats)
e- None of them.
b- Passive Attack (Threat)
d- Brute- Force Attack
16- Assurance that the communicating entity is the one claimed
a- Access Control
c- Data Integrity
e- Non- Repudiation
b- Authentication
d- Data Confidentiality
17- Prevention of the unauthorized use of a resource.
a- Access Control
c- Data Integrity
e- Non- Repudiation
b- Authentication
d- Data Confidentiality
18- Protection of data from unauthorized disclosure
a- Access Control
c- Data Integrity
e- Non- Repudiation
b- Authentication
d- Data Confidentiality
19- Assurance that data received is as sent by an authorized entity.
a- Access Control
c- Data Integrity
e- Non- Repudiation
b- Authentication
d- Data Confidentiality
20- Protection against denial by one of the parties in a communication
a- Access Control
c- Data Integrity
e- Non- Repudiation
b- Authentication
d- Data Confidentiality
21- In the Access control security model, the 1st line of defense that is an appropriate
gatekeeper functions based on a password to identify users is:
a- Access channel
b- Gatekeeper function
c- Internal security controls
d- security related transformation
22- In the network security model, develop methods to distribute and share the secret
information is:
a- Algorithm
b- Secret Information
c- Key Management
d- Protocol
23- The original message
a- Ciphertext
c- Key
e- Cryptology
b- Plaintext
d- Encipher
24- The coded message
a- Ciphertext
c- Key
e- Cryptology
b- Plaintext
d- Encipher
25- Algorithm for transforming plaintext to ciphertext
a- Ciphertext
c- Key
e- Cryptology
b- Plaintext
d- Cipher
26- Information used in cipher known only to sender/receiver
a- Ciphertext
c- Key
e- Cryptology
b- encipher (encrypt)
d- Cipher
27- Converting plaintext to ciphertext
a- Ciphertext
c- Key
e- Cryptology
b- Encipher (Encrypt)
d- Cryptanalysis
28- Recovering ciphertext from plaintext
a- Ciphertext
c- Cryptology
e- Cryptography
b- Decipher (Decrypt)
d- Cipher
29- Study of encryption principles/methods
a- Ciphertext
b- Decipher (Decrypt)
c- Cryptology
d- Cipher
e- Cryptography
30- The study of principles/ methods of deciphering ciphertext without knowing key
a- Ciphertext
c- Cryptology
e- Cryptography
b- Decipher (Decrypt)
d- Cryptanalysis
31- The field of both cryptography and cryptanalysis
a- Ciphertext
c- Cryptology
e- Cryptography
b- Decipher (Decrypt)
d- Cryptanalysis
32- Cryptography can be characterized by the type of encryption operations used to
a- Single or Private/ Two or Public Key
b- Block/ Stream
c- Substitution/Transposition/ Product
d- None of them
33- Cryptography can be characterized by the way in which plaintext is processed to
a- Single or Private/ Two or Public Key
c- Substitution/Transposition/ Product
b- Block/ Stream
d- None of them
34- Cryptography can be characterized by the number of keys used to
a- Single or Private/ Two or Public Key
c- Substitution/Transposition/ Product
b- Block/ Stream
d- None of them
35- Earliest known substitution cipher, the first attested use in military affairs. It
replaces each letter by 3rd letter on.
a- Playfair Cipher
c- Monoalphabetic cipher
b- Caesar Cipher
d- Vigenere Cipher
35- Rather than just shifting the alphabet, it could shuffle (jumble) the letters
arbitrarily, each plaintext letter maps to a different random ciphertext letter. Hence
key is 26 letters long.
a- Playfair Cipher
c- Monoalphabetic cipher
b- Caesar Cipher
d- Vigenere Cipher
36- Not even the large number of keys in a monoalphabetic cipher provides security.
One approach to improving security was to encrypt multiple letters by:
a- Playfair Cipher
c- Monoalphabetic cipher
e- None of them.
b- Caesar Cipher
d- Rail-fence Cipher
37- Another approach to improving security is to use multiple cipher alphabets . It
called polyalphabetic substitution ciphers. This method makes cryptanalysis harder
with more alphabets to guess and flatter frequency distribution.
a- Vigenere Cipher
c- Monoalphabetic cipher
e- None of them
b- Caesar Cipher
d- Rail-fence Cipher
38- Repetitions in ciphertext give clues to period, so find same plaintext an exact
period apart which results in the same ciphertext. Ideally want a key as long as the
message, Vigenère proposed.
a- One Time Pad Cipher
c- Monoalphabetic cipher
e- None of them
b- Caesar Cipher
d- Autokey Cipher
39- If a truly random key as long as the message is used, the cipher will be secure, this
is
a- One Time Pad Cipher
c- Monoalphabetic cipher
e- None of them
b- Caesar Cipher
d- Autokey Cipher
40- It write message letters out diagonally over a number of rows, then read off cipher
row by row. This is one type of transposition cipher
a- Vigenere Cipher
c- Monoalphabetic cipher
e- None of them
b- Caesar Cipher
d- Rail-fence Cipher
41- A more complex scheme, it writes letters of message out in rows over a specified
number of columns then reorder the columns according to some key before reading
off the rows.
a- Vigenere Cipher
c- Row- Transposition cipher
e- None of them
b- Caesar Cipher
d- Rail-fence Cipher
42- Machine implemented a very complex, varying substitution cipher. It is used a
series of cylinders, each giving one substitution, which rotated and changed after each
letter was encrypted with 3 cylinders have 263=17576 alphabets, were widely used in
WW2.
a- German Enigma, Allied Hagelin, Japanese Purple Machines b- Rotors
Machine
c- WW2 Encryption Machines
d- None of them
43- An alternative to encryption hides existence of message with another message.
This is
a- Cryptography
c- Cryptology
e- None of them
b- Steganography
d- Cryptanalysis
44- Most widely used block cipher in world, adopted in 1977 by NBS (now NIST) as
FIPS PUB 46. It encrypts 64-bit data using 56-bit key.
a- Data Encryption Standard (DES)
b- IDEA
c- Blowfish
d- RC2
e-Cast-128
45- A private key symmetric block cipher until now
• 128-bit data, 128/192/256-bit keys
• stronger & faster than Triple-DES
• active life of 20-30 years (+ archival use)
• provide full specification & design details
• both C & Java implementations
•
NIST have released all submissions & unclassified analyses
a- Data Encryption Standard (DES)
c- Blowfish
e-Cast-128
b- IDEA
d- ASE
46- Designed by Rijmen-Daemen in Belgium, it
• has 128/192/256 bit keys, 128 bit data
• an iterative rather than feistel cipher
• It is a encryption standard in US sine oct, 2000
a- Data Encryption Standard (DES)
c- Rijndael
e-Cast-128
b- IDEA
d- ASE
47- This is the most popular symmetric stream cipher
 Designed by Rivestfor RSA Security
 Used in SSL/TLS (Secure Sockets Layer/Transport Layer Security) standards for
secure communication between Web browsers and servers
 Used in WEP, part of the IEEE 802.11 wireless LAN standard
 was kept as a trade secret by RSA Inc but got anonymously posted on the Internet
in 1994
a- Data Encryption Standard (DES)
c- Rijndael
e-Cast-128
b- RC4
d- ASE
48- A symmetric block cipher designed by Bruce Schneier in 1993/94
• characteristics
– fast implementation on 32-bit CPUs
– compact in use of memory
– simple structure for analysis/implementation
– variable security by varying key size
• has been implemented in various products
• uses a 32 to 448 bit key
a- Data Encryption Standard (DES)
c- Rijndael
e- Cast-128
b- RC4
d- Blowfish
49- It can classify uses into 3 categories:
– encryption/decryption (provide secrecy)
– digital signatures (provide authentication)
– key exchange (of session keys)
a- Private Key Cryptography
b- Public Key Cryptography
c- Private and Public Key Cryptography d- None of them
50- IT is developed by Rivest, Shamir & Adleman of MIT in 1977
• best known & widely used public-key scheme
•
based on exponentiation in a finite (Galois) field over integers modulo a prime
a- ElGamal Cipher
c- RSA Cipher
b- Elliptic Key Cipher
d- None of them
51- A public-key type scheme proposed by Diffie & Hellman in 1976 along with the
exposition of public key concepts. It is application is
a- Encryption/ Decryption
c- Key Exchange
b- Digital Signature
d- None of them
52- Majority of public-key crypto (RSA, D-H) use either integer or polynomial
arithmetic with very large numbers/polynomials. It imposes a significant load in
storing and processing keys and messages. Offers same security with smaller bit sizes
a- ElGamal Cipher
c- RSA Cipher
b- Elliptic Key Cipher
d- None of them
53- The Application of DSA ( Digital Signature Algorithm) and DSS( Digital
Signature Standard) are:
a- Encryption/ Decryption
b- Digital Signature
c- Key Exchange
d- None of them
53- The Success of Digital Immune System (Advance anti virus system) depends on:
a- Monitor Program on Clint machine b- administrative machine
c- Generic decryption machine
d- Virus analysis machine
e- None of them
54- Prevention of the unauthorized use of a resource.
a- security related transformation
b- Gatekeeper function
c- Internal security controls
d- Access channel
e- None of them
55- Any virus entering organization is captured, analyzed, detection/shielding created
for it, removed.
a- First generation
b- Second generation
c- Third generation
d- Generic Decryption
e- Digital Immune system
56- Usually targeted at Microsoft Outlook mail agent & Word/Excel documents.
a- Trojan horse
b- Logic Bomb
c- Macro virus
d- Trap door
e- Worm
57- In the system access control, the way you tell the system who you are.
a- Authentication
b- Fabrication
c- Identification
d- Modification
e- None of them
58- In the system access control, the way you improve your identity.
a- Authentication
b- Fabrication
c- Identification
d- Modification
e- None of them
59- A public function of the message with secret key that produces a fixed-length
value that serves as the authenticator.
a- MAC function
c- Encryption function
b- Hash Function
d- None of them
59a- A public function maps a message of any length into a fixed-length value, which
serves as authenticator.
a- MAC function
c- Encryption function
b- Hash Function
d- None of them
60- A symmetric block cipher designed by Ron Rivest. The algorithm designed to be
easy to implement on 16-bit Microprocessor and using variable key size from 8 to
1024 bit. .
a- DES
c- BlowFish
e- IDEA
b- RC2
d- Cast 128
61- Virtual CPU emulator a module that scan the target code looking for known virus
signature.
a- Generic Encryption
c- None of them
b- IBM Digital Immune system
62- The 2nd line of defense that monitors activity and analyze stored information in an
attempt to detect the unwanted intruders.
a- Access channel
c- Internal security controls
e- None of them
b- Gatekeeper function
d- security related transformation
63- It was designed by NIST & NSA in 1993, revised 1995
• US standard for use with DSA signature scheme
• standard is FIPS 180-1 1995, also Internet RFC3174
• produces 160-bit hash values
• now the generally preferred hash algorithm
a- MD5
c- MD2
b- Secure Hash Algorithm (SHA)
d- MD4
64- It was designed by Ronald Rivest (the R in RSA)
• latest in a series of MD2, MD4
•
•
•
produces a 128-bit hash value
until recently was the most widely used hash algorithm
specified as Internet standard RFC1321
a- MD5
c- MD2
b- Secure Hash Algorithm (SHA)
d- MD4
65- US Govt approved signature scheme FIPS 186
• uses the SHA hash algorithm
• designed by NIST & NSA in early 90's
•
DSA is the algorithm
a- Digital Signature Standard (DSS) b- Encryption Standard
c- Key Exchange Standard
d- None of them
66- Widely used de facto secure email
• developed by Phil Zimmermann
• selected best available crypto algorithms to use
• integrated into a single program
• available on Unix, PC, Macintosh and Amiga systems
• originally free, now have commercial versions available also
a- S/MIME
c- SHTTP
b- PGP
d- None of them
67- It has support in various modern mail agents: MS Outlook, Netscape etc. It
cryptographic Algorithms and certifications are:
• hash functions: SHA-1 & MD5
• digital signatures: DSS & RSA
• session key encryption: ElGamal & RSA
• message encryption: Triple-DES, RC2/40 and others
• have a procedure to decide which algorithms to use
• it uses X.509 v3 certificates
• managed using a hybrid of a strict X.509 CA hierarchy & PGP’s web of trust
• each client has a list of trusted CA’s certs
• and own public/private key pairs & certs
• certificates must be signed by trusted CA’s
a- S/MIME
c- SHTTP
b- PGP
d- None of them
68- It considered some application specific security mechanisms
– eg. S/MIME, PGP, Kerberos, SSL/HTTPS
• however there are security concerns that cut across protocol layers
• would like security implemented by the network for all applications
• general mechanisms provides
– authentication
– confidentiality
– key management
• applicable to use over LANs, across public & private WANs, & for the
Internet
•
•
mandatory in IPv6, optional in IPv4
It used in a firewall/router t provide strong security to all traffic crossing the
perimeter.
a- Secure Socket Layer (SSL)
c- Secure Electronic Transfer (SET)
b- IP Security
d- None of them
69- Web now widely used by business, government, individuals, but Internet &
Web are vulnerable. The web has a variety of threats
– integrity
– confidentiality
– denial of service
– authentication
• Need added security mechanisms, which mechanism need?
a- IP Security
b- Web Security
c- Secure Electronic Transfer (SET)
d- None of them
70- A layer security service
• originally developed by Netscape
• version 3 designed with public input
• subsequently became Internet standard known as TLS (Transport Layer
Security)
• uses TCP to provide a reliable end-to-end service
• It has two layers of protocols
a- Secure Socket Layer (SSL)
c- Secure Electronic Transfer (SET)
b- IP Security
d- None of them
71- Open encryption & security specification to protect Internet credit card
transaction developed in 1996 by Mastercard, Visa etc, not a payment system. Rather
a set of security protocols & formats
– secure communications amongst parties
– trust from use of X.509v3 certificates
– privacy by restricted info to those who need it
a- Secure Socket Layer (SSL)
c- Secure Electronic Transfer (SET)
b- IP Security
d- None of them
72- A secret entry point into a program
• allows those who know access bypassing usual security procedures
• have been commonly used by developers
• a threat when left in production programs allowing exploited by attackers
• very hard to block in O/S
• requires good s/w development & update
a- Logic Bomb
c- Virus
e- None of them
b- Trap door
d- Trojan horse
73- One of oldest types of malicious software
•
•
•
code embedded in legitimate program
activated when specified conditions met
– eg presence/absence of some file
– particular date/time
– particular user
when triggered typically damage system
– modify/delete files/disks
a- Logic Bomb
c- Virus
e- None of them
b- Trap door
d- Trojan horse
74- A program with hidden side-effects
• which is usually superficially attractive
– eg game, s/w upgrade etc
• when run performs some additional tasks
– allows attacker to indirectly gain access they do not have directly
• often used to propagate a virus/worm or install a backdoor
• or simply to destroy data
a- Logic Bomb
c- Virus
e- None of them
b- Trap door
d- Trojan horse
75- A piece of self-replicating code attached to some other code
• both propagates itself & carries a payload
– carries code to make copies of itself
– as well as code to perform some covert task
a- Logic Bomb
c- Virus
e- None of them
b- Trap door
d- Trojan horse
76- Replicating but not infecting program
• typically spreads over a network
– cf Morris
– led to creation of CERTs
• using users distributed privileges or by exploiting system vulnerabilities
• widely used by hackers to create zombie PC's, subsequently used for further
attacks, esp DoS
• major issue is lack of security of permanently connected systems, esp PC's
a- Logic Bomb
c- Virus
e- None of them
b- Worm
d- Trojan horse
77- Macro code attached to some data file
• interpreted by program using file
– eg Word/Excel macros
– esp. using auto command & command macros
•
•
•
•
code is now platform independent
is a major source of new viral infections
blurs distinction between data and program files making task of detection
much harder
classic trade-off: "ease of use" vs "security"
a- Logic Bomb
c- Macro Virus
e- None of them
b- Worm
d- Trojan horse
78- Spread using email with attachment containing a macro virus
– cf Melissa
• triggered when user opens attachment
• or worse even when mail viewed by using scripting features in mail agent
• usually targeted at Microsoft Outlook mail agent & Word/Excel documents
a- Logic Bomb
c- E-mail Virus
e- None of them
b- Worm
d- Trojan horse
79- Use a Network to transfer from System to System. Their sole purpose is to
replicate themselves
a- Logic Bomb
b- Worm
c- E-mail Virus
d- Trojan horse
e- Bactria
80- A type of virus designed to hide itself from detection by antivirus software
a - Parasitic virus
c- Boot sector virus
e- Polymorphic virus
b- Memory-resident virus
d- Stealth virus
81- Is a traditional Virus and still most common form of virus? It attaches itself to
executable files and replicates
a - Parasitic virus
c- Boot sector virus
e- Polymorphic virus
b- Memory-resident virus
d- Stealth virus
82 - A virus, that mutates with every infection making detection by the “signature” of
the virus impossible.
a- Stealth Virus
b- Polymorphic Virus
c- Parasitic Virus
d- Boot Sector Virus
e- Memory resident Virus
83- A generation of antivirus the scanner uses virus signature to identify virus or
change in length of programs
a- 1st generation
c- 3rd generation
b- 2nd generation
d- 4th generation
84- A generation of antivirus the scanner uses heuristic rules to spot viral infection or
uses program checksums to spot changes.
a- 1st generation
c- 3rd generation
b- 2nd generation
d- 4th generation
85- A generation of antivirus that packages with a variety of antivirus techniques eg
scanning & activity traps, access-controls
a- 1st generation
c- 3rd generation
b- 2nd generation
d- 4th generation
86- generation of antivirus which is a memory-resident programs identify virus by
actions
a- 1st generation
c- 3rd generation
b- 2nd generation
d- 4th generation
87- An advance antivirus use CPU simulator to check program signature & behavior
before actually running it
a- Generic Encryption System
b- IBM Digital Immune System
c- Monitor Encryption System
d- None of them
88- General purpose emulation & virus detection any virus entering org is captured,
analyzed, detection/shielding created for it, removed.
a- Generic Encryption System
c- Monitor Encryption System
b- IBM Digital Immune System
d- None of them
89- The process by which one entity verifies that another entity is who they claim to
be
a- Auditing
c- Authorization
e- None of them
b- Authentication
d- Integrity
90- The process that ensures that a person has the right to access certain resources
a- Auditing
c- Authorization
e- None of them
b- Authentication
d- Integrity
91- The process of collecting information about attempts to access particular
resources, use particular privileges, or perform other security actions.
a- Auditing
c- Authorization
e- None of them
b- Authentication
d- Integrity
92- Storage devices (e.g., magnetic strips) used in a two-factor authentication system
that contains a secret code.
a- Active token
c- Biometric systems
b- Passive token
d- None of them
93- Small, stand-alone electronic devices in a two factor authentication system that
generate one-time passwords
a- Active token
c- Biometric systems
b- Passive token
d- None of them
94- Authentication systems that identify a person by measurement of a biological
characteristic such as a fingerprint, iris (eye) pattern, facial features, or voice
a- Active token
c- Biometric systems
b- Passive token
d- None of them
95- Measurements derived directly from different parts of the body (e.g., fingerprints,
iris, hand, facial characteristics)
a- Physiological biometrics
c- Active token
b- Behavioral biometrics
d- None of them
96- Measurements derived from various actions and indirectly from various body
parts (e.g., voice scans or keystroke monitoring)
a- Physiological biometrics
c- Active token
b- Behavioral biometrics
d- None of them
97- A scheme for securing e-payments using public key encryption and various
technical components
a- SSL
c- SET
b-PKI
d- Web security
98- An identifying code that can be used to authenticate the identity of the sender of a
document, Portable, Cannot be easily repudiated or imitated, and can be time-stamped
a- Digital Signature
c- Key Exchange
b- Encryption/ Decryption
d- None of them
99- The combination of the encrypted original message and the digital signature,
using the recipient’s public key
a- Digital Signature
c- Digital Envelope
b- Encryption/ Decryption
d- None of them
100- A summary of a message, converted into a string of digits, after the hash has
been applied
a- Digital Signature
c- Digital Envelope
b- Message digest
d- None of them
101- Third parties that issue digital certificates
a- Digital Signature
c- Digital Envelope
b- Message digest
d- Certificate authorities (CAs)
102- A network node consisting of both hardware and software that isolates a private
network from a public network
a- Firewall
c- Application-level proxy
b- Digital Signature
d- None of them
103- Rules that can accept or reject incoming packets based on source and destination
addresses and the other identifying information
a- SSL
c- Application-level proxy
b- Packet Filter Firewall
d- None of them
104- A firewall that permits requests for Web pages to move from the public Internet
to the private network
a- SSL
c- Application-level proxy
b- Packet Filter Firewall
d- None of them
105- A special hardware server that utilizes application-level proxy software to limit
the types of requests that can be passed to an organization’s internal networks from
the public Internet
a- Bastion gateway
b- Packet Filter Firewall
c- Application-level proxy
d- None of them
106- Special software programs that run on the gateway server and pass repackaged
packets from one network to the other
a- Bastion gateway
c- proxy
b- Packet Filter Firewall
d- None of them
107- A network node designed to protect an individual user’s desktop system from the
public network by monitoring all the traffic that passes through the computer’s
network interface card
a- Bastion gateway
c- proxy
b- Packet Filter Firewall
d- Personal Firewall
108- A network that uses the public Internet to carry information but remains private
by using encryption to scramble the communications, authentication to ensure that
information has not been tampered with, and access control to verify the identity of
anyone using the network
a- Virtual private network (VPN )
c- Intrusion detection systems (IDSs)
b-Firewall
d- Proxy
109- A special category of software that can monitor activity across a network or on a
host computer, watch for suspicious activity, and take automated action based on what
it sees
a- Virtual private network (VPN)
c- Intrusion detection systems (IDSs)
b- Firewall
d- Proxy
110- The standard symmetric encryption algorithm supported the NIST and used by
U.S. government agencies until October 2, 2000.
a- IDEA
c- Rijndal
e- None of them
b- DES
d- RSA
111- The new Advanced Encryption Standard used to secure U.S. government
communications since October 2, 2000
a- IDEA
c- Rijndal
e- None of them
b- DES
d- RSA
Download