Which of the following was developed as a key exchange protocol and is used in SSL and IPsec?

a. DES
b. RSA
c. Diffie-Hellman
d. El Gamal


ANS: C

Computer Science & Information Technology

You might also like to view...

Can be used to swap the contents of two array entries, then the logic for the missing code is

Assuming a method ``` int findMax(int array[ ], int last) ``` that returns the subscript of the largest value in the portion of an array whose elements are at 0 through last (inclusive), a recursive method for sorting in ascending order a portion of an array between 0 and last, inclusive, can be written as follows: ``` void rSort(int array[ ], int last) { if (last >= 1) { // Missing code } } ``` If a method ``` void swap(int array[ ], int pos1, int pos2) ``` A) findMax(array, array.length-1); rSort(array, array.length-1); B) int p = findMax(array, array.length-1); rSort(array, p); C) int p = findMax(array, last); swap(array, p, last); rSort(array, last-1); D) rSort(array, last-1); int p = findMax(array, last); swap(array, p, last);

Computer Science & Information Technology

Which of the following is a metric that measures the average time it takes to bring a system back from failure?

a. MTTF b. MTBF c. MTTR d. All of the above are correct. e. None of the above is correct.

Computer Science & Information Technology

The commands in the Format tab of the Properties dialog box are used to change the appearance of the values on the PivotTable

Indicate whether the statement is true or false

Computer Science & Information Technology

Video files can be compressed to reduce the size of the PowerPoint presentation

Indicate whether the statement is true or false

Computer Science & Information Technology