A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.
A. asymmetric
B. symmetric
C. public
D. private
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following represents the I-bar pointer?
A.
B.
C.
D.
Computer Science & Information Technology
Which command is used to list file and subdirectories in the Linux directory structure?
A. ls B. list C. fs D. lfs
Computer Science & Information Technology
When searching for a particular record, a quick way to find it is the use of the ________ feature
Fill in the blank(s) with correct word
Computer Science & Information Technology
When creating a macro, the Message Box action has four arguments: Message, Beep, Type, and ________
Fill in the blank(s) with correct word
Computer Science & Information Technology