Symmetric key cryptography uses which of the following?

A) One public key
B) One shared key
C) Two public keys
D) One public and one private key


B) One shared key

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Names that are defined outside of a namespace are part of the unnamed namespace 2. In a program with no user defined namespaces, all names are defined in the global namespace 3. The global namespace and the unnamed namespace are the same. 4. Classes must always be defined in separate files 5. ADTs should be defined and implemented in separate files

Computer Science & Information Technology

With a ________ structure, the interviewer begins with generalized questions and then narrows possible responses.

A) funnel B) diamond C) pyramid D) cube

Computer Science & Information Technology

A ________ is software that controls access to data in a database.

a) database management server b) structured query language c) database management system d) data manipulation language

Computer Science & Information Technology

Recently, the human resources department manager requests that an employee's remaining or unused benefits be listed on their paycheck stubs. To provide this function, a secure connection must be made between several different software packages. As a security analyst, you have been asked to recommend members of the team that will work to design this new feature. Which business roles should you

recommend as members of this team to ensure that it is MOST effective? A. Finance Officer, Database Administrator, Security Administrator B. Finance Officer, Human Resources Representative, Security Administrator C. Legal Representative, Human Resources Representative, Security Administrator D. Network Administrator, Database Administrator, Security Administrator

Computer Science & Information Technology