DECT applications provides supervision in two ways,______ using handshake Mechanism and______ by decryption at intended user.
1)Authorization, Decryption
2) Authentication, Encryption
3)Authentication, Decryption
4) Authorization, Encryption
Answers
Answered by
0
option 1 is the correct answer
Answered by
0
DECT applications provide supervision in two ways Authentication using a handshake Mechanism and Encryption by decryption at the intended user.
Authentication:
- The credentials provided are compared to those on a file in a database containing the authorized user's information on a local operating system or within an authentication server.
- The encryption technique uses an algorithm to convert data, rendering the original data unreadable.
- The approach, for example, can convert plaintext into ciphertext, which is a variant of plaintext.
Similar questions