Key distribution often involves the use of __________ which are infrequently used and are long lasting.

A. private key certificates
B. master keys
C. session keys
D. public key certificates


B. master keys

Computer Science & Information Technology

You might also like to view...

Google automatically captures events in your Gmail messages and ________

A) copies them to Hangouts B) moves them to Google+ C) places them on your Google calendar D) flags them as important

Computer Science & Information Technology

A simple unary arithmetic expression has the form: literalValue operator literalValue.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Clicking the Query Design button in the Queries group on the Create tab will open the ____ dialog box.

A. Query Setup B. Crosstab Query Wizard C. Show Table D. Append

Computer Science & Information Technology

With short-circuit evaluation, each sub-condition is independent of any other sub-condition.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology