MCQOPTIONS
Saved Bookmarks
| 1. |
Which Authentication Encryption approach is taken by the SSH protocol? |
| A. | Hashing followed by encryption (H→E) |
| B. | Encryption followed by authentication (E→A) |
| C. | Authentication followed by encryption (A→E) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» E. | |