COMPUTER NETWORKING

MULTIMEDIA AND QUALITY OF SERVICE

COMPRESSION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Encryption ____ choose 3 possible answers
A
Uses at least one key to cipher data
B
Is only used on text
C
Can be symmetric or asymmetric
D
Is impossible to break
E
Has developed a lot as processing power has increased
Explanation: 

Detailed explanation-1: -Most internet security (IS) professionals break down encryption into three distinct methods: symmetric, asymmetric, and hashing.

Detailed explanation-2: -The Triple DES encryption process Triple DES operates in three steps: Encrypt-Decrypt-Encrypt (EDE). It works by taking three 56-bit keys (K1, K2 and K3) known as a key bundle and encrypting first with K1, decrypting next with K2 and encrypting a last time with K3.

There is 1 question to complete.