If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of the data and then use the asymmetric encryption system to encrypt the symmetric key, what would this type of usage be known as?
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?