(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)
(What is the length (in bits) of a SHA-1 hash output?)
(Why should an administrator choose lightweight cryptography?)
(What is an attribute of RC4 when used with WEP?)
(What type of encryption uses different keys to encrypt and decrypt the message?)
(Which attack may take the longest amount of time to achieve success?)
(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)
(What is the correlation between the number of rounds and the key length used in the AES algorithm?)