A security administrator wishes to implement a method of generating encryption keys from user passwords to
enhance account security. Which of the following would accomplish this task?
A.
NTLMv2
B.
Blowfish
C.
Diffie-Hellman
D.
PBKDF2
A security administrator wishes to implement a method of generating encryption keys from user passwords to
enhance account security. Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user passwords to
enhance account security. Which of the following would accomplish this task?
A.
NTLMv2
B.
Blowfish
C.
Diffie-Hellman
D.
PBKDF2