A security administrator wishes to implement a method of generating encryption keys from user passwords to enhance account security. Which of the following would accomplish this task?

A. NTLMv2
B. Blowfish
C. Diffie-Hellman
D. PBKDF2

Answer: C. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

Typically, ____ is measured by its storage capacity in kilobytes (KB).

A. ROM B. cache C. a memory module D. a cache module

Computer Science & Information Technology

The kernel’s _________ organizes each significant component of the kernel into different subdirectories.

a) architecture-specific code b) distribution c) source tree d) UML

Computer Science & Information Technology