1.

Communication between end systems is encrypted using a key, often known as(a) temporary key(b) section key(c) line key(d) session keyI have been asked this question during an online exam.My enquiry is from Symmetric Key Distribution in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

Right OPTION is (d) session KEY

The explanation is: The key is REFERRED to as session key.



Discussion

No Comment Found

Related InterviewSolutions