A security administrator wishes to implement a method of generating encryption keys from user passwords to enhance account security. Which of the following would accomplish this task?
A. NTLMv2
B. Blowfish
C. Diffie-Hellman
D. PBKDF2
Answer: C. Diffie-Hellman
Computer Science & Information Technology
You might also like to view...
Typically, ____ is measured by its storage capacity in kilobytes (KB).
A. ROM B. cache C. a memory module D. a cache module
Computer Science & Information Technology
The kernel’s _________ organizes each significant component of the kernel into different subdirectories.
a) architecture-specific code b) distribution c) source tree d) UML
Computer Science & Information Technology