ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 14 Topic 2 Discussion

ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 14 Topic 2 Discussion

ISSAP Exam Topic 2 Question 14 Discussion:
Question #: 14
Topic #: 2

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.


A.

Block cipher


B.

Stream cipher


C.

Transposition cipher


D.

Message Authentication Code


Get Premium ISSAP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.