A security technician would like an application to use random salts to generate short lived encryption leys during the secure communication handshake process to increase communication security. Which of the following concepts would BEST meet this goal?

A. Ephemeral keys
B. Symmetric Encryption Keys
C. AES Encryption Keys
D. Key Escrow

Answer: B. Symmetric Encryption Keys

Computer Science & Information Technology

You might also like to view...

________ view displays thumbnails of slides in the presentation

A) Slide Sorter B) Reading C) Normal D) Presenter

Computer Science & Information Technology

Two forms of locality are temporal locality and __________ locality.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology