A. protocol list B. MIME C. block list D. extension
A. The same key is used for encryption and decryption. B. It is commonly used to create digital certificate signatures. C. It uses two keys: one for encryption and a different key for decryption. D. An attacker can decrypt data if the attacker captures the key used for encryption.
A. [edit security policies from-zone HR to-zone HR] B. [edit security zones functional-zone management protocols] C. [edit security zones protocol-zone HR host-inbound-traffic] D. [edit security zones security-zone HR host-inbound-traffic protocols]