We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
7. In symmetric key cryptography, each party should use which of the following?
9. Stream ciphers are normally selected over block ciphers because of which of the following?