adplus-dvertising
frame-decoration

Question

Communication between end systems is encrypted using a key, often known as

a.

temporary key

b.

section key

c.

line key

d.

session key

Answer: (d).session key

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Communication between end systems is encrypted using a key, often known as

Similar Questions

Discover Related MCQs

Q. Session keys are transmitted after being encrypted by

Q. For a network with N nodes, how many master keys are present?

Q. PDU stands for

Q. SSM stands for

Q. Which is the last step in establishing a connection between hosts using the SSM?

Q. Larger networks would prefer a full decentralization.

Q. Which of these is not a type of session key?

Q. Which session key is used for electronic funds transfer and point of sale applications?

Q. Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?

Q. Hash Value = H = h(CV)
Key Input = Km XOR H
Ciphertext = E([Km XOR H],Ks)
What is CV here?

Q. Which is the correct representation for session key recovery for the plain text?

Q. Which of the following is required to find the session key?

i) Control Vector
ii) Master Key
iii) Encrypted session Key

Q. “Meet in the middle attack” and “man in the middle attack” are the same.

Q. “Meet in the middle attack” is an attack

Q. Public key encryption/decryption is not preferred because

Q. Which one of the following is not a public key distribution means?

Q. What is the PGP stand for?

Q. PGP makes use of which cryptographic algorithm?

Q. USENET is related to which of the following Public Key distribution schemes?

Q. Which of the following public key distribution systems is most secure?