Exchanging data securely with an online bank requires several steps. Place the steps listed below in order:

I. Step 1
II. Step 2
III. Step 3
IV. Step 4
V. Step 5

A. Your browser sends domain name to verify legitimacy and CA sends bank's public key to
your browser.
B. Browser and bank's computer uses symmetric key to encrypt and continue exchanging data.
C. Browser uses your computer to generate a 64 bit or 128 bit number to be used as a symmetric key.
D. Browser uses bank's public key to encrypt the number to be used as the symmetric key.
E. Both computers erase symmetric key when finished.


C, A, D, B, E

Computer Science & Information Technology

You might also like to view...

Microsoft recommends that at least four DCs should be present in any organization using Active Directory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What command would be used to check the TCP/IP stack on a networked computer?

A) ping 127.0.0.1 B) tracert C) ipconfig D) nslookup

Computer Science & Information Technology

What IPAM Administrators group will allow its assigned members the ability to monitor and manage IPAM tasks?

A. IPAM ASM B. IPAM MSM C. IPAM IP D. IPAM Users

Computer Science & Information Technology

Closing all routes of attack into an organization's system(s) is called ________.

A. access control B. total security C. defense in depth D. comprehensive security

Computer Science & Information Technology