Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?