5:00
Stop
CEH - Cryptography - Cryptography Concepts
Advanced
1/5
You are conducting a security assessment for a company that needs to implement a secure authentication system for remote users. The system will be used by employees to access sensitive corporate resources from various locations. The client wants to ensure that authentication credentials are securely exchanged while minimizing the risk of man-in-the-middle attacks. Which encryption approach would be most appropriate for this scenario?
Advanced