How can a symmetric key be securely exchanged over an insecure communication medium when both sides of the communication do not have key pair sets?

A. Diffie-Hellmann
B. RSA
C. Digital envelopes
D. Digital signatures


Answer: A. Diffie-Hellmann

Computer Science & Information Technology

You might also like to view...

What would you tell your boss about the potential disadvantages of the committee approach and what are the alternatives?

What will be an ideal response?

Computer Science & Information Technology

You’ve just configured an IP VLAN interface on a switch, and the interface is not up. How do you troubleshoot the issue?

What will be an ideal response?

Computer Science & Information Technology

Evaluate the following conditional expressions in a step-by-step manner as shown in the examples when x = 1 and y = 2.

Note: In the solutions below, indicate the current logical expression being evaluated according to the rules of precedence. NOT((x — 2) > = 1 OR (x — 1) < > 0 AND NOT (x = 1)) Evaluates as True

Computer Science & Information Technology

In Page Layout, an inserted page break is indicated by a(n) ________ line

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology