Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?

A. Steganography
B. Hashing algorithm
C. Asymmetric cryptography
D. Steam cipher


Answer: C. Asymmetric cryptography

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a VM building block stored in the library?

A. hardware profiles B. templates C. .avhd files D. ISO file

Computer Science & Information Technology

When you want to communicate with a remote computer in a different location, you can use a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Different items appearing in the same value list of a Select Case block must be separated by a .

(A) semi colon (B) comma (C) colon (D) pair of quotation marks

Computer Science & Information Technology

What four network properties enable you to distinguish one type of network from another?

What will be an ideal response?

Computer Science & Information Technology