The key used in symmetric encryption is referred to as a __________ key.

A. public
B. secret
C. private
D. decryption


B. secret

Computer Science & Information Technology

You might also like to view...

Data typically move between a disk’s surface and memory a __________ at a time.

a. track b. sector c. cylinder d. logical record

Computer Science & Information Technology

The name of the presentation and the name of the program is displayed in the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

When adding a file to an attachment field, the file is actually copied into the database itself

Indicate whether the statement is true or false

Computer Science & Information Technology

An agent wants to create fast and efficient cryptographic keys to use with Diffie-Hellman without using prime numbers to generate the keys. Which of the following should be used?

A. Elliptic curve cryptography B. Quantum cryptography C. Public key cryptography D. Symmetric cryptography

Computer Science & Information Technology