____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A. Message authentication code
B. Digital certificate
C. Key agreement
D. Keyed hashes


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. When a recursive function directly calls itself, this is known as direct recursion. 2. Indirect recursion means that a function calls itself several times. 3. A recursive function cannot call a function other than itself. 4. Recursive algorithms tend to be less efficient than iterative algorithms.

Computer Science & Information Technology

The dup2 system call differs from dup in that it

A. makes two copies of a file descriptor B. is given a specific destination for the copy

Computer Science & Information Technology

Which recovery model causes all changes to the database to be written to the transaction log?

A. simple recovery model B. full recovery model C. bulk logged recovery model D. truncated recovery model

Computer Science & Information Technology

Once a report has been created, its appearance can be modified in Design or ________ view

A) Datasheet B) Report C) Form D) Layout

Computer Science & Information Technology