SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
A . TRUE
B . FALSE

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments