Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?
A. Steganography
B. Hashing algorithm
C. Asymmetric cryptography
D. Steam cipher
Answer: C. Asymmetric cryptography
Computer Science & Information Technology
You might also like to view...
A ________ line break creates a split in a line but keep the text in the same paragraph
A) section B) manual C) leader character D) character
Computer Science & Information Technology
The Organizer can be used to copy ________ from one document to another
A) hyperlinks B) text C) graphics D) styles
Computer Science & Information Technology