An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys.Which of the following algorithms is appropriate for securing the key exchange?
A. DES
B. Blowfish
C. DSA
D. Diffie-Hellman
E. 3DES
Answer: D. Diffie-Hellman
You might also like to view...
In the system requirements evaluation process, what must be done to ensure that requirements satisfy relevant functions of the proposed product?
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. Destructor functions are often used to free memory that was allocated by the object. 2. While a class's member functions may be overloaded, the constructor cannot be overloaded. 3. When using smart pointers to dynamically allocate objects in C++ 11, it is unnecessary to delete the dynamically allocated objects because the smart pointer will automatically delete them. 4. When passing a file stream object to a function, you should always pass it by reference.
Objects such as graphics and sound can be inserted into a Writer document
Indicate whether the statement is true or false
You can click the Logical button (Formulas tab | Function Library group) and click IFERROR to insert the IF function.
Answer the following statement true (T) or false (F)