Question 345 A cryptographic system that uses only symmetric key cryptography cannot provide digital signature because : A Symmetric key cryptography is computationally infeasible. B Symmetric […]
Question 346 Match the terms with the definition. (a) Masquerading (i) Session is intercepted (b) Phishing (ii) One pretends to be someone else (c) Hijacking (iii) […]