Barry recently received a message from Melody that Melody encrypted using symmetric cryptography. What key should Barry use to decrypt the message?
A. Barry's public key
B. Barry's private key
C. Melody's public key
D. Shared secret key
Answer: D. Shared secret key
You might also like to view...
The ActionListener interface requires that the method ____________ be implemented.
a. actionEvent() b. actionFired() c. actionRegistered() d. actionPerformed()
In the derived class, which data members of the base class are visible?
a. those in the public section only b. those in the protected section only c. those in the public or protected sections d. those in the public or private sections e. all data members are visible
Which of the following is NOT a degree that prepares students for IT careers?
A) Management information systems B) Business administration C) Computer science D) Information technology
To find a contribution amount of $300 or greater, the entry in the Amount field's criteria should be:
A) >=300. B) >300. C) 300. D) >=$300.