Which of the following encryption algorithms can be used by the SSH protocol?

SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol? Each
correct answer represents a complete solution. Choose all that apply.

SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol? Each
correct answer represents a complete solution. Choose all that apply.

A.
Blowfish

B.
DES

C.
IDEA

D.
RC4



Leave a Reply 0

Your email address will not be published. Required fields are marked *