Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?