How can a symmetric key be securely exchanged over an insecure communication medium when both sides of the communication do not have key pair sets?
A. Diffie-Hellmann
B. RSA
C. Digital envelopes
D. Digital signatures
Answer: A. Diffie-Hellmann
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a main touch gesture?
A) tap B) tweak C) pinch D) slide
Computer Science & Information Technology
After making changes to a source data set, PivotTable data should be refreshed to update the changes in the PivotTable
Indicate whether the statement is true or false.
Computer Science & Information Technology