Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 4 Question 52 Discussion

Actual exam question for GIAC's GISF exam
Question #: 52
Topic #: 4
[All GISF Questions]

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Theresia
3 months ago
The block cipher is the way to go. It's like building a fortress around your data - no one's getting in without the key!
upvoted 0 times
Solange
2 months ago
I agree, it provides strong protection like a fortress.
upvoted 0 times
...
Goldie
2 months ago
Block cipher is definitely the best option for securing data.
upvoted 0 times
...
Santos
2 months ago
D) Block cipher
upvoted 0 times
...
Bobbye
2 months ago
C) Stream cipher
upvoted 0 times
...
Lashon
2 months ago
B) Message Authentication Code
upvoted 0 times
...
Bulah
2 months ago
A) Transposition cipher
upvoted 0 times
...
...
Becky
3 months ago
This exam is making me feel like a secret agent. 'Choose all that apply' - it's like I'm disarming a bomb or something!
upvoted 0 times
Gail
2 months ago
D) Block cipher
upvoted 0 times
...
Buck
2 months ago
C) Stream cipher
upvoted 0 times
...
Doyle
3 months ago
B) Message Authentication Code
upvoted 0 times
...
Youlanda
3 months ago
A) Transposition cipher
upvoted 0 times
...
...
Bette
4 months ago
Transposition cipher? What is this, the Enigma machine? I'm sticking with the modern techniques, thank you very much.
upvoted 0 times
Vivan
2 months ago
Message Authentication Code is important for ensuring data integrity.
upvoted 0 times
...
Enola
3 months ago
Stream cipher is also commonly used in symmetric encryption.
upvoted 0 times
...
Fannie
3 months ago
Block cipher is a good choice for symmetric encryption.
upvoted 0 times
...
Emerson
3 months ago
I prefer modern techniques too. Transposition cipher seems outdated.
upvoted 0 times
...
...
Isidra
4 months ago
Ooh, message authentication code, that's a fancy one! I bet that'll really put the 'secure' in symmetric encryption.
upvoted 0 times
...
Katlyn
4 months ago
Hmm, I think the stream cipher and block cipher are the way to go here. Gotta keep those secrets under lock and key, you know?
upvoted 0 times
Margot
3 months ago
Definitely, those techniques help ensure data confidentiality and integrity.
upvoted 0 times
...
Zita
3 months ago
I agree, stream cipher and block cipher are essential for secure communication.
upvoted 0 times
...
...
Cordell
4 months ago
I believe C) Stream cipher can also be used for symmetric encryption.
upvoted 0 times
...
Hyman
4 months ago
I agree with Earnestine, Block cipher is definitely a technique for symmetric encryption.
upvoted 0 times
...
Earnestine
4 months ago
I think D) Block cipher can be used for symmetric encryption.
upvoted 0 times
...

Save Cancel