The key used in symmetric encryption is referred to as a __________ key.
A. public
B. secret
C. private
D. decryption
B. secret
Computer Science & Information Technology
You might also like to view...
Data typically move between a disk’s surface and memory a __________ at a time.
a. track b. sector c. cylinder d. logical record
Computer Science & Information Technology
The name of the presentation and the name of the program is displayed in the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
When adding a file to an attachment field, the file is actually copied into the database itself
Indicate whether the statement is true or false
Computer Science & Information Technology
An agent wants to create fast and efficient cryptographic keys to use with Diffie-Hellman without using prime numbers to generate the keys. Which of the following should be used?
A. Elliptic curve cryptography B. Quantum cryptography C. Public key cryptography D. Symmetric cryptography
Computer Science & Information Technology