Which of the following situations would be the best environment for use of a symmetric cryptosystem?
a. Corporate e-mail system
b. Site-to-site VPN
c. Certificate authority
d. Web site certificates
Ans: b. Site-to-site VPN
Computer Science & Information Technology
You might also like to view...
How does an access point know if a wireless data packet is intended for its network?
What will be an ideal response?
Computer Science & Information Technology
What technology is used to assure that the logical block addressing on a solid-state drive does not always address the same physical blocks, in order to distribute write operations?
A. Wear leveling B. SMART C. Trimming D. Data migration
Computer Science & Information Technology