Public-key cryptography is symmetric in that ________.

a) it decrypts messages using the same key it uses to encrypt
b) both the sender and the receiver use the same key
c) it employs two inversely related keys
d) either host can create a key and both hosts can use it


c) it employs two inversely related keys

Computer Science & Information Technology

You might also like to view...

When a disk is first formatted, a single __________ is created.

a. directory b. root directory c. directory structure d. The premise of this question is false.

Computer Science & Information Technology

The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?

A. training period B. baseline scanning C. profile monitoring D. traffic normalizing

Computer Science & Information Technology

An ExecutorService object is created by calling a static method of which class?

a. Executor. b. Executors. c. ExecutorService. d. Thread.

Computer Science & Information Technology

An inconsistency in a database is referred to as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology