Public key cryptography uses which of the following?
A. A shared key
B. A public key
C. A private key
D. Both a public and a private key
Answer: D
Explanation: Public key cryptography, also called asymmetric key cryptography, uses two keys: a public key and a private key.
You might also like to view...
To use the fields in an unsaved query, you need to first save the query before the fields appear in the Expression Builder
Indicate whether the statement is true or false
Changing an animation start method to ________ enables the animation effect to begin immediately after the completion of the previous animation or slide transition
Fill in the blank(s) with correct word
A value of "right" is a valid value when using the margin property
Indicate whether the statement is true or false
What is the first argument in the DLookup function?
A. the domain B. the criteria C. true or false D. the field that is used for the calculation