多项选择题
Which three are distinctions between asymmetric and symmetric algorithms? ()
A.Only symmetric algorithms have a key exchange technology built in
B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
C.Only asymmetric algorithms have a key exchange technology built in
D.Asymmetric algorithms are based on more complex mathematical computations
点击查看答案
相关考题
-
多项选择题
Whichtwoactionscanbeconfiguredtoallowtraffictotraverseaninterfacewhenzone-basedsecurityisbeingemployed?()
A.Pass
B.Flow
C.Allow
D.Inspect -
单项选择题
Whichmethodisofgainingaccesstoasystemthatbypassesnormalsecuritymeasures?()
A.Starting a Smurf attack
B.Conducting social engineering
C.Creating a back door
D.Launching a DoS attack -
单项选择题
Whichoptionensuresthatdataisnotmodifiedintransit?()
A.Authorization
B.Confidentiality
C.Authentication
D.Integrity
