1.

Communication between end systems is encrypted using a key, often known as

A. temporary key
B. section key
C. line key
D. session key
Answer» E.


Discussion

No Comment Found