Multiple Choice
The most common hybrid cryptography system is based on the ____ key exchange, which is a method for exchanging private keys using public-key encryption.
A) MAC
B) RSA
C) DES
D) Diffie-Hellman
Correct Answer:

Verified
Correct Answer:
Verified
Q38: Where is information most vulnerable?<br>A) When it
Q39: Hash _ are mathematical functions that create
Q40: Match each item with a statement below.<br>a.Algorithm<br>f.Encipher<br>b.Cryptosystem<br>g.Steganography<br>c.Cryptogram<br>h.Substitution<br>d.Code<br>i.Transposition<br>e.Decipher<br>-The
Q41: Match each item with a statement below.<br>a.Algorithm<br>f.Encipher<br>b.Cryptosystem<br>g.Steganography<br>c.Cryptogram<br>h.Substitution<br>d.Code<br>i.Transposition<br>e.Decipher<br>-The
Q42: Hash functions confirm message identity and integrity.
Q44: The _ protocol is used for public-key
Q45: Why is WEP considered to be too
Q46: What is salting and how does it
Q47: One of the most widely known symmetric
Q48: When it comes to cryptosystems, the security