

MCQOPTIONS
Saved Bookmarks
1. |
Which Authentication Encryption approach is taken by the SSH protocol? |
A. | Hashing followed by encryption (H→E) |
B. | Encryption followed by authentication (E→A) |
C. | Authentication followed by encryption (A→E) |
D. | Independently encrypt and authenticate (E + A) |
Answer» E. | |