Ann, a security administrator, needs to implement a transport encryption solution that will enable her to detect attempts to sniff packets. Which of the following could
be implemented?
A.
Eliptical curve algorithms
B.
Ephemeral keys
C.
Quantum cryptography
D.
Steganography