Barry recently received a message from Melody that Melody encrypted using symmetric cryptography. What key should Barry use to decrypt the message?

A. Barry's public key
B. Barry's private key
C. Melody's public key
D. Shared secret key


Answer: D. Shared secret key

Computer Science & Information Technology

You might also like to view...

The ActionListener interface requires that the method ____________ be implemented.

a. actionEvent() b. actionFired() c. actionRegistered() d. actionPerformed()

Computer Science & Information Technology

In the derived class, which data members of the base class are visible?

a. those in the public section only b. those in the protected section only c. those in the public or protected sections d. those in the public or private sections e. all data members are visible

Computer Science & Information Technology

Which of the following is NOT a degree that prepares students for IT careers?

A) Management information systems B) Business administration C) Computer science D) Information technology

Computer Science & Information Technology

To find a contribution amount of $300 or greater, the entry in the Amount field's criteria should be:

A) >=300. B) >300. C) 300. D) >=$300.

Computer Science & Information Technology