Which three protocols use asymmetric key algorithms? (Choose three.)

IT Questions BankCategory: Cybersecurity EssentialsWhich three protocols use asymmetric key algorithms? (Choose three.)

Which three protocols use asymmetric key algorithms? (Choose three.)

  • Secure File Transfer Protocol (SFTP)
  • Telnet
  • Pretty Good Privacy (PGP)
  • Secure Shell (SSH)
  • Advanced Encryption Standard (AES)
  • Secure Sockets Layer (SSL)

Explanation: Four protocols use asymmetric key algorithms:
Internet Key Exchange (IKE)
Secure Socket Layer (SSL)
Secure Shell (SSH)
Pretty Good Privacy (PGP)

More Questions: Cybersecurity Essentials Chapter 4 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x