McqMate
| Q. |
Challenge-response authentication can be done using ________. |
| A. | symmetric-key ciphers |
| B. | asymmetric-key ciphers |
| C. | keyed-hash functions |
| D. | all of the above |
| Answer» D. all of the above | |
View all MCQs in
Data Communication and NetworkingNo comments yet