1. Which of the following implements a security policy that specifies who and what may have access to each specific system resource and the type of access that is permitted in each instance

| February 14, 2018

1. Which of the following implements a security policy that specifies who and what may have access to each specific system resource and the type of access that is permitted in each instance.
a. Access control
b. resource control
c. System control
d.Audit control
2. Stream ciphers operate on which of the following?
a. Fixed-length groups of bits called blocks
b. Individual digits, one at a time, with the transformation varying during the encryption
c. individual blocks, once ata time, with the transformation varying during the encryption
d. fixed length groups of digits called blocks.
3. In AES that is also known as Rjindael, there are:
a. 10,12 or 14 cycles for keys of 128, 192 and 256 bits, respectively
b. 10,14 or 16 cycles for keys of 128, 192 and 256 bits, respectively
c. 12, 14 or 16 cycles or keys of 128, 192 and 256 bits, respectively
d. none of the above
4. Hashing is used to provide which of the following?

Order your essay today and save 30% with the discount code: ESSAYHELP
Order your essay today and save 30% with the discount code: ESSAYHELPOrder Now