1.

Which Authentication Encryption approach is taken by the SSH protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E +

A. Hashing followed by encryption (H→E)
B. Encryption followed by authentication (E→A)
C. Authentication followed by encryption (A→E)
D. Independently encrypt and authenticate (E + A)
Answer» E.


Discussion

No Comment Found