Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?

Which of the following is the BEST technology for the sender to use in order to secure the in-band
exchange of a shared key?

Which of the following is the BEST technology for the sender to use in order to secure the in-band
exchange of a shared key?

A.
Steganography

B.
Hashing algorithm

C.
Asymmetric cryptography

D.
Steam cipher



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen + 10 =