Which three protocols use asymmetric key algorithms? (Choose three.)
- Secure File Transfer Protocol (SFTP)
- Telnet
- Pretty Good Privacy (PGP)
- Secure Shell (SSH)
- Advanced Encryption Standard (AES)
- Secure Sockets Layer (SSL)
Explanation: Four protocols use asymmetric key algorithms:
Internet Key Exchange (IKE)
Secure Socket Layer (SSL)
Secure Shell (SSH)
Pretty Good Privacy (PGP)
Exam with this question: Cybersecurity Essentials Chapter 4 Quiz Answers
Please login or Register to submit your answer