(What makes the RC4 cipher unique compared to RC5 and RC6?)
(Which authentication method allows a customer to authenticate to a web service?)
(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)
(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)