List of questions
Related questions
Question 274 - 312-38 discussion
Which of the following is susceptible to a birthday attack?
A.
Authentication
B.
Integrity
C.
Authorization
D.
Digital signature
Your answer:
0 comments
Sorted by
Leave a comment first