Notifications
Clear all
Topic starter
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
- A . cryptographic key exchange
B. endpoint security
C. cryptographic key generation
D. security of data in transit
Suggested Answer: B
Posted : 27/11/2022 5:46 pm