Which of the following cryptographic improvements should be made to the current architecture to achieve the stated goals?
Which of the following approaches to combining the disparate mechanisms has the LOWEST up front development costs?
Which of the following methods should the security research use to enumerate the ports and protocols in use by the appliance?