1.

Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks?

Answer»

Which of the FOLLOWING cryptographic strategies may be USED to overcome Man-in-the-Middle attacks?
Choose the correct option from below list
(1)Authentication
(2)Authorization
(3)CONFUSION
(4)Encryption

Answer:-(1)Authentication



Discussion

No Comment Found