Computer Science, asked by idfake28f, 2 months ago

DECT applications provides supervision in two ways,______ using handshake Mechanism and______ by decryption at intended user.

1)Authorization, Decryption
2) Authentication, Encryption
3)Authentication, Decryption
4) Authorization, Encryption​

Answers

Answered by rinagurung90086
0

option 1 is the correct answer

Answered by adventureisland
0

DECT applications provide supervision in two ways Authentication using a handshake Mechanism and Encryption by decryption at the intended user.

Authentication:

  • The credentials provided are compared to those on a file in a database containing the authorized user's information on a local operating system or within an authentication server.
  • The encryption technique uses an algorithm to convert data, rendering the original data unreadable.
  • The approach, for example, can convert plaintext into ciphertext, which is a variant of plaintext.
Similar questions