An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys.Which of the following algorithms is appropriate for securing the key exchange?

A. DES
B. Blowfish
C. DSA
D. Diffie-Hellman
E. 3DES


Answer: D. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

In the system requirements evaluation process, what must be done to ensure that requirements satisfy relevant functions of the proposed product?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Destructor functions are often used to free memory that was allocated by the object. 2. While a class's member functions may be overloaded, the constructor cannot be overloaded. 3. When using smart pointers to dynamically allocate objects in C++ 11, it is unnecessary to delete the dynamically allocated objects because the smart pointer will automatically delete them. 4. When passing a file stream object to a function, you should always pass it by reference.

Computer Science & Information Technology

Objects such as graphics and sound can be inserted into a Writer document

Indicate whether the statement is true or false

Computer Science & Information Technology

You can click the Logical button (Formulas tab | Function Library group) and click IFERROR to insert the IF function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology