How can a symmetric key be securely exchanged over an insecure communication medium when both sides of the communication do not have key pair sets?

A. Diffie-Hellmann
B. RSA
C. Digital envelopes
D. Digital signatures

Answer: A. Diffie-Hellmann

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a main touch gesture?

A) tap B) tweak C) pinch D) slide

Computer Science & Information Technology

After making changes to a source data set, PivotTable data should be refreshed to update the changes in the PivotTable

Indicate whether the statement is true or false.

Computer Science & Information Technology