Which of the following is an Asymmetric algorithm?
Correct Answer: El Gamal
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Internet Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Internet Security MCQ Questions
Which helps us to block attacks on a single machine?
What is the key length of Triple DES?
Which protocol is used by TACACS+?
Which key is used to decrypt the message in PKI?
Which statement resemble Trojan horses?
Which of the following is a VALID authorization key?
How can cookies be used to mitigate cross-site scripting?
Which version of TLS is vulnerable to BEAST exploit?
Sandboxing does what to computer programs?
Which of the following threats corresponds with an attacker targeting specific employees of a company?