What type of encryption uses the same key to encrypt and to decrypt information?

What will be an ideal response?


Symmetric encryption

Computer Science & Information Technology

You might also like to view...

Which of the following is the method used to display a dialog box to gather input?

a. showMessageDialog. b. getInput. c. inputDialog. d. showInputDialog.

Computer Science & Information Technology

The _________ creates queries within database objects such as forms and reports

Fill in the blank(s) with correct word

Computer Science & Information Technology

RAID-5 is also known as striping with parity, and provides fault tolerance

Indicate whether the statement is true or false

Computer Science & Information Technology

The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?

A. Host software base-lining B. File snapshot collection C. TPM D. ROMDB verification

Computer Science & Information Technology