The more frequently session keys are exchanged the more __________ they are because the opponent has less ciphertext to work with for any given session key.
A. insecure
B. streamlined
C. secure
D. obsolete
C. secure
Computer Science & Information Technology
You might also like to view...
The _______ is a collection of hardware and software associated with the Internet that allows computer users to locate and view multimedia-based documents on almost any subject.
a) HyperText Markup Language b) HyperText Transfer Protocol c) World Wide Web d) CERN
Computer Science & Information Technology
Items appearing in the parentheses of a calling statement are known as .
(A) call variables (B) call strings (C) parameters (D) arguments
Computer Science & Information Technology