Which of the following statements about asymmetric key cryptography is true?

A. Asymmetric key cryptography uses one shared key.
B. Asymmetric key cryptography is also called private key cryptography.
C. Asymmetric key cryptography uses two keys called public keys.
D. Asymmetric key cryptography is also called public key cryptography.


Answer: D
Explanation: Asymmetric key cryptography is also called public key cryptography, and it uses two keys that are mathematically related called public and private key.

Computer Science & Information Technology

You might also like to view...

Identify the letter of the choice that best matches the phrase or definition.

A. A series of data points on a line that shows data values representing the general direction in a data series B. The sequence of values that Excel uses to create a chart C. Horizontal axis D. Vertical axis in a two-dimensional chart E. Descriptive text that appears above a data marker in a chart

Computer Science & Information Technology

When building an action query, data will not be changed until you click the ____ button.

A. Datasheet B. Query Type C. Run D. Update

Computer Science & Information Technology

Which of the following functions counts the number of cells that are not blank within a specified range of cells.

Computer Science & Information Technology

Photoshop, Illustrator, and Fireworks are all examples of _______________ programs because they allow you to alter images.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology