InterviewSolution
Saved Bookmarks
| 1. |
Communication between end systems is encrypted using a key, often known as(a) temporary key(b) section key(c) line key(d) session keyI have been asked this question during an online exam.My enquiry is from Symmetric Key Distribution in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right OPTION is (d) session KEY |
|