Multiple Choice
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
A) Authenticated
B) Joined
C) Submit
D) Separate
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Transmission control protocol is<br>A)connection oriented protocol<br>B)uses a
Q6: Application layer protocol defines<br>A)types of messages exchanged<br>B)message
Q7: User datagram protocol is called connectionless because<br>A)all
Q8: An asymmetric-key (or public-key) cipher uses<br>A)1 Key<br>B)2
Q9: Shift cipher is sometimes referred to as
Q11: Which one of the following is an
Q12: Transport layer aggregates data from different applications
Q13: Heart of Data Encryption Standard (DES), is
Q14: A hash function must meet _ criteria.<br>A)two<br>B)three<br>C)four<br>D)none
Q15: What is Unicode?<br>A)Represents symbol or characters used