Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
A) public key
B) asymmetric encryption
C) key escrow
D) SQL injection
E) SHA1 hash
Answer :

Leave a Comment