Q.

Challenge-response authentication can be done using ________.

A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer» D. all of the above
620
0
Do you find this helpful?
1

View all MCQs in

Internet Security

Discussion

No comments yet