What type of key is used in symmetric cryptography, must be known by both parties, and is used for both encryption and decryption?

A. Ciphertext
B. Shared secret
C. Private key
D. Public key


Answer: B

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, what kind of gradient is sample 1?

A. shortened radial B. radial C. linear D. shortened linear

Computer Science & Information Technology

Which of the following is NOT an option listed when clicking the Delete button on the Table Tools Layout tab?

A) Delete column B) Delete table C) Delete cell D) Delete row

Computer Science & Information Technology

What property of a hash function means that collisions are not a security problem. That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

What will be an ideal response?

Computer Science & Information Technology

Compare the capabilities of queries and filters.

What will be an ideal response?

Computer Science & Information Technology