Which of the following cryptographic algorithms is being used by the We-are-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not authenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not authenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?

A.
RSA

B.
Twofish

C.
Blowfish

D.
Diffie-Hellman

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *