Cisco Exam Questions

which of the following?

Birthday attacks can protest against which of the following?

A.
symmetric ciphering

B.
asymmetric ciphering

C.
hash algorithms

D.
digital signatures