1.

Which of the following cryptographic strategy may be used to overcome man-in -the - middle attacks? option- authentication,encryption, confusion,authorization

Answer»

ication is MAY be ANSWER



Discussion

No Comment Found