Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
A) Authenticated
B) Joined
C) Submit
D) Separate
Correct Answer:
Verified
Q15: The ASCII encoding of binary data is
Q16: A high speed communication equipment typically would
Q17: What is Unicode?
A)Represents symbol or characters used
Q18: In OSI model dialogue control and token
Q19: An asymmetric-key (or public-key) cipher uses
A)1 Key
B)2
Q20: A straight permutation cipher or a straight
Q22: We use Cryptography term to transforming messages
Q23: Shift cipher is sometimes referred to as
Q24: Substitutional cipers are
A)Monoalphabatic
B)Sami alphabetic
C)polyalphabetic
D)both a and c
Q25: Heart of Data Encryption Standard (DES), is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents