Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of a shared key?

A. Steganography
B. Hashing algorithm
C. Asymmetric cryptography
D. Steam cipher

Answer: C. Asymmetric cryptography

Computer Science & Information Technology

You might also like to view...

A ________ line break creates a split in a line but keep the text in the same paragraph

A) section B) manual C) leader character D) character

Computer Science & Information Technology

The Organizer can be used to copy ________ from one document to another

A) hyperlinks B) text C) graphics D) styles

Computer Science & Information Technology