Integrity
Confidentiality
Availability
Auditability
Equipment failure
Software failure
Personnel
Hackers
Data integrity, data strategy, data mining
Data and system availability, data storage, data confidentiality
Data integrity, data and system availability, data confidentiality
Data strategy, data integrity, data center.
They are often used for wire-speed encryption in data networks
They are based on complex mathematical operations and can easily be accelerated by hardware
They offer simple key management properties
They are best used for one-time encryption needs.
An encryption
A decryption
A hash
A public key
Identification
Authentication
Hashing
None of the above
Detect modified messages
Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.
Keep information secret.
Receiver can verify who sender was.
Slow, fast
Slow, slow
Fast, fast
Fast, slow
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.