Q:

Which Authentication Encryption approach is taken by the SSH protocol?

0

Which Authentication Encryption approach is taken by the SSH protocol?


  1. Hashing followed by encryption (H→E)
  2. Encryption followed by authentication (E→A)
  3. Authentication followed by encryption (A→E)
  4. Independently encrypt and authenticate (E + A)

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

 (d).Independently encrypt and authenticate (E + A)

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - MESSAGE AUTHENTICATION CODES AND KEY MANAGEMENT MCQ

Similar questions


need a help?


find thousands of online teachers now
Hashing followed by encryption (H→E) is used by ... >>
<< Which Authentication Encryption approach is taken ...