Which of the following situations would be the best environment for use of a symmetric cryptosystem?

a. Corporate e-mail system
b. Site-to-site VPN
c. Certificate authority
d. Web site certificates

Ans: b. Site-to-site VPN

Computer Science & Information Technology

You might also like to view...

How does an access point know if a wireless data packet is intended for its network?

What will be an ideal response?

Computer Science & Information Technology

What technology is used to assure that the logical block addressing on a solid-state drive does not always address the same physical blocks, in order to distribute write operations?

A. Wear leveling B. SMART C. Trimming D. Data migration

Computer Science & Information Technology