Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
The Message confidentiality or privacy means that the sender and the receiver expect
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
373
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
399
In Message Integrity, the message digest needs to be kept
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
394
The message digest needs to be
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
355
When the data must arrive at the receiver exactly as they were sent, its called
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
381
To preserve the integrity of a document, both the document and the fingerprint are
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
438
Message confidentiality is using
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
387
A sender must not be able to deny sending a message that was sent, is known as
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
385
The digest created by a hash function is normally called a
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
393
MAC stands for
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
385
Encryption and decryption provide secrecy, or confidentiality, but not
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
391
A session symmetric key between two parties is used
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
401
One way to preserve the integrity of a document is through the use of a
Networks
2022-06-02
Answers
30
Question
40
Followers
30
1
1
476
Total:
11022
Previous
564
565
566
567
568
Next
Go