Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
The Message confidentiality or privacy means that the sender and the receiver expect
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
332
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
354
In Message Integrity, the message digest needs to be kept
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
358
The message digest needs to be
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
322
When the data must arrive at the receiver exactly as they were sent, its called
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
347
To preserve the integrity of a document, both the document and the fingerprint are
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
394
Message confidentiality is using
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
351
A sender must not be able to deny sending a message that was sent, is known as
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
348
The digest created by a hash function is normally called a
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
353
MAC stands for
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
347
Encryption and decryption provide secrecy, or confidentiality, but not
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
357
A session symmetric key between two parties is used
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
364
One way to preserve the integrity of a document is through the use of a
Networks
2022-06-02
Answers
30
Question
40
Followers
30
1
1
443
Total:
11022
Previous
564
565
566
567
568
Next
Go