The more frequently session keys are exchanged the more __________ they are because the opponent has less ciphertext to work with for any given session key.

A. insecure
B. streamlined
C. secure
D. obsolete

C. secure

Computer Science & Information Technology

You might also like to view...

The _______ is a collection of hardware and software associated with the Internet that allows computer users to locate and view multimedia-based documents on almost any subject.

a) HyperText Markup Language b) HyperText Transfer Protocol c) World Wide Web d) CERN

Computer Science & Information Technology

Items appearing in the parentheses of a calling statement are known as .

(A) call variables (B) call strings (C) parameters (D) arguments

Computer Science & Information Technology