M

Mr. Dubey • 52.63K Points
Coach

Q. Challenge-response authentication can be done using ________.

(A) symmetric-key ciphers
(B) asymmetric-key ciphers
(C) keyed-hash functions
(D) all of the above
Share

No solution found for this question.
Add Solution and get +2 points.

You must be Logged in to update hint/solution

Discusssion

Login to discuss.

Be the first to start discuss.


Question analytics