Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?
A. Steganography
B. Hashing algorithm
C. Asymmetric cryptography
D. Steam cipher
Answer: C. Asymmetric cryptography
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a VM building block stored in the library?
A. hardware profiles B. templates C. .avhd files D. ISO file
Computer Science & Information Technology
When you want to communicate with a remote computer in a different location, you can use a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Different items appearing in the same value list of a Select Case block must be separated by a .
(A) semi colon (B) comma (C) colon (D) pair of quotation marks
Computer Science & Information Technology
What four network properties enable you to distinguish one type of network from another?
What will be an ideal response?
Computer Science & Information Technology