A security administrator must implement a system to allow clients to securely negotiate encryption keys with the company's server over a public unencrypted communication channel. Which of the following implements the required secure key negotiation?

A. PBKDF2
B. Symmetric encryption
C. Steganography
D. ECDHE
E. Diffie-Hellman


Answer:
D. ECDHE
E. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

If a namespace is attached to the schema, only the root element needs to be _______ in the instance document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A do while loop is an example of a(n) ____________________-controlled loop.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The data transfer for V.92/90 is called asymmetric operation because the data rate connection to the ISP is at V.24 speeds where the data rate connection from the ISP is at V.92/90 speeds. True or False?

Indicate whether the statement is true or false

Computer Science & Information Technology

Several browsers are available at shareware websites.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology