A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.

A. asymmetric
B. symmetric
C. public
D. private


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following represents the I-bar pointer?

A.
B.
C.
D.

Computer Science & Information Technology

Which command is used to list file and subdirectories in the Linux directory structure?

A. ls B. list C. fs D. lfs

Computer Science & Information Technology

When searching for a particular record, a quick way to find it is the use of the ________ feature

Fill in the blank(s) with correct word

Computer Science & Information Technology

When creating a macro, the Message Box action has four arguments: Message, Beep, Type, and ________

Fill in the blank(s) with correct word

Computer Science & Information Technology