1.

Which Authentication Encryption approach is taken by the SSH protocol?

A. Hashing followed by encryption (H→E)
B. Encryption followed by authentication (E→A)
C. Authentication followed by encryption (A→E)
D. Independently encrypt and authenticate (E + A)
Answer» E.


Discussion

No Comment Found