What type of encryption algorithm uses two keys to encrypt and decrypt data?
A. signing
B. symmetric
C. asymmetric
D. hash
Answer: C
Computer Science & Information Technology
You might also like to view...
All of the following are examples of malware, EXCEPT ________
A) worms B) spam C) viruses D) spyware
Computer Science & Information Technology
Both statistical and logical inference can be identified by monitoring and analyzing unusual queries and by setting a baseline and threshold alert for unusual user activity.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ________ tab will show you who is logged in to a computer
A) Login B) Users C) Personnel D) Account
Computer Science & Information Technology
Item B in the accompanying figure is used to _______________ layers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology