Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 4 Question 52 Discussion

Actual exam question for GIAC's GISF exam
Question #: 52
Topic #: 4
[All GISF Questions]

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Theresia
2 months ago
The block cipher is the way to go. It's like building a fortress around your data - no one's getting in without the key!
upvoted 0 times
Solange
3 days ago
I agree, it provides strong protection like a fortress.
upvoted 0 times
...
Goldie
5 days ago
Block cipher is definitely the best option for securing data.
upvoted 0 times
...
Santos
6 days ago
D) Block cipher
upvoted 0 times
...
Bobbye
8 days ago
C) Stream cipher
upvoted 0 times
...
Lashon
15 days ago
B) Message Authentication Code
upvoted 0 times
...
Bulah
20 days ago
A) Transposition cipher
upvoted 0 times
...
...
Becky
2 months ago
This exam is making me feel like a secret agent. 'Choose all that apply' - it's like I'm disarming a bomb or something!
upvoted 0 times
Gail
19 days ago
D) Block cipher
upvoted 0 times
...
Buck
22 days ago
C) Stream cipher
upvoted 0 times
...
Doyle
1 months ago
B) Message Authentication Code
upvoted 0 times
...
Youlanda
1 months ago
A) Transposition cipher
upvoted 0 times
...
...
Bette
2 months ago
Transposition cipher? What is this, the Enigma machine? I'm sticking with the modern techniques, thank you very much.
upvoted 0 times
Vivan
17 days ago
Message Authentication Code is important for ensuring data integrity.
upvoted 0 times
...
Enola
1 months ago
Stream cipher is also commonly used in symmetric encryption.
upvoted 0 times
...
Fannie
2 months ago
Block cipher is a good choice for symmetric encryption.
upvoted 0 times
...
Emerson
2 months ago
I prefer modern techniques too. Transposition cipher seems outdated.
upvoted 0 times
...
...
Isidra
2 months ago
Ooh, message authentication code, that's a fancy one! I bet that'll really put the 'secure' in symmetric encryption.
upvoted 0 times
...
Katlyn
2 months ago
Hmm, I think the stream cipher and block cipher are the way to go here. Gotta keep those secrets under lock and key, you know?
upvoted 0 times
Margot
1 months ago
Definitely, those techniques help ensure data confidentiality and integrity.
upvoted 0 times
...
Zita
2 months ago
I agree, stream cipher and block cipher are essential for secure communication.
upvoted 0 times
...
...
Cordell
2 months ago
I believe C) Stream cipher can also be used for symmetric encryption.
upvoted 0 times
...
Hyman
3 months ago
I agree with Earnestine, Block cipher is definitely a technique for symmetric encryption.
upvoted 0 times
...
Earnestine
3 months ago
I think D) Block cipher can be used for symmetric encryption.
upvoted 0 times
...

Save Cancel