An attacker can use which of the following to steal a user's password if the password isn't strong and unique?
What's the name of the chip located on a motherboard that provides cryptograghic services?
Which of the following is a one-way process that can't be used to reveal the original data?
One of the software programs below has been purchased by Symantec and is proprietary and the other is open source. Which software program is open source?
Which of the following is not a symmetric encryption algorithm?
Linux and Mac OS strengthen the hashes of password files by adding the following:
Which of the following tools can't be used for whole disk encryption?
Which of the following ciphers is more secure?
Which of the following is not an asymmetric algorithm?
Hashing provides which of the following?
Which family of encryption algorithms uses both a public key and a private key?
How many keys are used in symmetric cryptography?
What encryption tool is built into the Microsoft Windows operating system to encrypt individual files and folders?