Question 27 Identify the incorrect statement : A The ATM adaptation layer is not service dependent. B Logical connections in ATM are referred to as virtual […]
Question 4 Which of the following encryption algorithms is based on the Feistel structure? A Advanced Encryption Standard B RSA public key cryptographic algorithm C Data […]
Question 3 If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will […]