Design develops the results of analysis into a(n) ________ model for building the system.
A) conceptual
B) abstract
C) concrete
D) physical
Question 2
______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.
What will be an ideal response?