1. An authenticator is:
a. A value used to authenticate a message
b. The party in a protocol who first authenticates the other party
c. Proof of the authenticity of a certificate
d. The output of a hash function to be signed
2. Why should data compression be performed before encryption rather than after?
a. Compression is less effective on random data
b. Compressing after encryption interferes with feedback modes for block ciphers
c. The numeric format of RSA cannot be changed after encryption
d. It is redundant as commercial compression software includes encryption.
These multiple choice questions belong to Computer Science. The 1st question discusses about authenticator. The 2nd question is about why data compression should be performed before encryption.
Total Word Count NA
If you are here for the first time, you can request for a discount coupon, which can knock off upto 20% of the quoted price on any service.