Public-key cryptography is symmetric in that ________.
a) it decrypts messages using the same key it uses to encrypt
b) both the sender and the receiver use the same key
c) it employs two inversely related keys
d) either host can create a key and both hosts can use it
c) it employs two inversely related keys
You might also like to view...
When a disk is first formatted, a single __________ is created.
a. directory b. root directory c. directory structure d. The premise of this question is false.
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?
A. training period B. baseline scanning C. profile monitoring D. traffic normalizing
An ExecutorService object is created by calling a static method of which class?
a. Executor. b. Executors. c. ExecutorService. d. Thread.
An inconsistency in a database is referred to as a(n) ________
Fill in the blank(s) with correct word