Which of these protocols use asymmetric key algorithms? (Select three answers)

IT Questions BankCategory: Cybersecurity EssentialsWhich of these protocols use asymmetric key algorithms? (Select three answers)

Which of these protocols use asymmetric key algorithms? (Select three answers)

  • Telnet
  • Secure File Transfer Protocol (SFTP)
  • Secure Sockets Layer (SSL)
  • Advanced Encryption Standard (AES)
  • Secure Shell (SSH)
  • Pretty Good Privacy (PGP)

Explanation: Four protocols use asymmetric key algorithms:
Internet Key Exchange (IKE)
Secure Socket Layer (SSL)
Secure Shell (SSH)
Pretty Good Privacy (PGP)

More Questions: Cybersecurity Essentials Module 2 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x