A security administrator must implement a system to allow clients to securely negotiate encryption keys with the company's server over a public unencrypted communication channel. Which of the following implements the required secure key negotiation?
A. PBKDF2
B. Symmetric encryption
C. Steganography
D. ECDHE
E. Diffie-Hellman
Answer:
D. ECDHE
E. Diffie-Hellman
You might also like to view...
If a namespace is attached to the schema, only the root element needs to be _______ in the instance document.
Fill in the blank(s) with the appropriate word(s).
A do while loop is an example of a(n) ____________________-controlled loop.
Fill in the blank(s) with the appropriate word(s).
The data transfer for V.92/90 is called asymmetric operation because the data rate connection to the ISP is at V.24 speeds where the data rate connection from the ISP is at V.92/90 speeds. True or False?
Indicate whether the statement is true or false
Several browsers are available at shareware websites.
Answer the following statement true (T) or false (F)