. Question 41 .
Which of the following is not one of the three important factors determining the strength of any encryption system ?
. Question 42 .
Which of the following descriptions is not associated with symmetric encryption ?
. Question 43 .
An electronic document that certifies the identity of the owner of a particular public key .
. Question 44 .
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers ' personal information ?
. Question 45 . These are used to create digital signatures . . Question 46 .
This determines the correctness of the logical relationship between two data items .
. Question 47 . This determines if characters are of the proper type . . Question 48 . Check digit verification is an example of a ( n ) . Question 49 .
This batch processing data entry control sums a non-financial numeric field .