1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
5

The IT director asks you to set up a system that will encrypt credit card data. She wants you to use the most secure symmetric a

lgorithm with the least amount of CPU usage. Which of the following algorithms should you select?a. SHA-1
b. AES
c. RSA
d. 3DES
Computers and Technology
1 answer:
bonufazy [111]3 years ago
8 0

The IT director asks you to set up a system that will encrypt credit card data. She wants you to use the most secure symmetric algorithm with the least amount of CPU usage. The algorithms that we should select is <u>AES Advanced Encryption Standard</u>

Explanation:

  • <u>The AES is also referred to as Advanced Encryption Standard, it is also known as  Rijndael</u>
  • <u>AES is a specification standard that is used for the  encryption of electronic data .</u>
  • <u>It was established by the U.S. National Institute of Standards and Technology in the year  2001</u>

<u />

  • <u>AES is a symmetric block cipher which encrypts the plain text and converts it into cipher text which consist of random characters.Only the individual having the special key can decrypt it .</u>

<u />

  • <u> AES uses a type of symmetric key encryption, which indicates the  use of one secret key to cipher and decipher information.</u>
  • <u>The Advanced Encryption Standard is used by the  U.S. government to protect classified information and is used to encrypt sensitive information</u>

<u />

<u>AES comes in 128-bit, 192-bit, and 256-bit variants and AES 256 provide you the highest level of security</u>

<u></u>

You might be interested in
Which two related organizations are responsible for managing the top-level domain name space and the root domain name system (dn
juin [17]

I guess the correct answers are,

IANA (Internet Assigned Numbers Authority)

ICANN (Internet Corporation for Assigned Names and Numbers)

Thе Intеrnеt Assignеd Numbеrs Authοrity (IANA) is a functiοn οf, a nοnprοfit privatе Amеrican cοrpοratiοn that οvеrsееs glοbal IP addrеss allοcatiοn, autοnοmοus systеm numbеr allοcatiοn, rοοt zοnе managеmеnt in thе Dοmain Namе Systеm (DNS), mеdia typеs, and οthеr Intеrnеt Prοtοcοl-rеlatеd symbοls and Intеrnеt numbеrs.

Thе Intеrnеt Cοrpοratiοn fοr Assignеd Namеs and Numbеrs (ICANN /ˈaɪkæn/ ЕYЕ-kan) is a nοnprοfit οrganizatiοn rеspοnsiblе fοr cοοrdinating thе maintеnancе and prοcеdurеs οf sеvеral databasеs rеlatеd tο thе namеspacеs and numеrical spacеs οf thеIntеrnеt, еnsuring thе nеtwοrk's stablе and sеcurе οpеratiοn.

6 0
3 years ago
What is a Boolean operator
Alenkasestr [34]
A boolean operator is one of those: and, or, not
true and true gives you true
<span>false and false gives you false
</span><span>false and true gives you false
</span><span>true and false gives you false
</span>true or true gives you true
true or false gives you true
false or true gives you true
false or false gives you false
not true gives you false
not false gives you true
7 0
4 years ago
Read 2 more answers
In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) desi
denpristay [2]
The animals have no place way to get go to sleep
5 0
4 years ago
If you could build your own personal computer, what components would you purchase? Put
lesya [120]

Always start with the choice of a CPU first because that would determine other components. For example, let's say I want want to use AMD Ryzen Threadripper 3990X as the CPU, all I need to do is to refer to its specification to know what other componets will be compatible.

With the specification, we can tell that this CPU is only compatible with DDR4 RAM (up to 4 slots) and PCIe 4.0 Graphic Card. So, I'd probably get 8 DDR4 RAM (any brand should be fine) and a RTX3080Ti GPU if there is no budget limit.

Next, since we have chosen the CPU, RAM and GPU, we can now choose a motherboard based on these choices. In other words, all we need to do is look for a motherboard that is compatible with our choice of CPU, GPU and RAM.

Then, I'll look for a cooler for the CPU because the stock cooler usually isn't good enough if I want to overclock the CPU.

Next, I would choose a power supply unit (PSU) that can provide enough power for the GPU that I have selected and compatible with the motherboard.

Next, I'd decide what data storage to use for this custom built pc. I highly recommend at least one PCIe 4. 0 SSD as a boot drive and one standard SATA Hard Disk to store all data. I'll also add in a SATA DVD drive. SATA connectivity is pretty standard for storage drives, so they should all be compatible.

Okay, let's breakdown the cost (without any peripherals such as keyboard, monitor, mouse, etc):

  • CPU AMD Ryzen™ Threadripper 3990X ($5546.20)
  • GPU Gigabyte AORUS MASTER GeForce RTX 3080 Ti ($3049.03)
  • Motherboard MSI Creator TRX40 ($1359.99)
  • Memory Corsair Dominator Platinum 128 GB (8 x 16 GB) DDR4-3200 CL16 Memory ($3998)
  • Storage Samsung 960 Pro 2TB ($1999.99)
  • Cooler NZXT Kraken X72 Liquid CPU Cooler ($479.90)
  • Case Phanteks Enthoo Elite ATX Full Tower ($915.98)
  • Power Supply Corsair AXi ($787.99)
  • Operating System Windows 10 Pro ($199.99)

The total cost would be around $18,283.50

How does it compare to a similar computer purchased? With these choices, there isn't any similar pre-built computer by other brands such as Dell or HP because this pc is VERY powerful and highly customizable. The key difference is probably the lack of after-sales customer service if you buy components separately from different stores.

3 0
3 years ago
The ____ of a hub, switch or other networking device is a specially configured connection that is capable of viewing all the tra
yan [13]

Answer:A. monitoring port

Explanation: A monitoring port is a device that is present in a hub or other inter-connection devices used for regulating the traffic taking place as people use the internet services. It collects the data received by the VLAN and sends them to the Network analyser, in cases where several networks are been monitored not all the frames are collected or copied to the network analyser.

4 0
4 years ago
Other questions:
  • The expressionvecCont.empty() empties the vector container of allelements.
    13·1 answer
  • Does any body like animal jam
    11·2 answers
  • How do i keep my hardware safe?
    6·2 answers
  • What is SAFFiR? (The robot)
    12·1 answer
  • The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:
    5·1 answer
  • A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
    10·1 answer
  • The formula A$7+$D7in cell was copied to cell H10.write the formula as it would appear in cell H10
    5·1 answer
  • Images using pixels are ____________________ images, while images using mathematics are ____________________ images
    13·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • Question B_1 (15 points) Please define (describe) local variables and how they are used in computer programming ( e.g. In C, C )
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!