In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.
A. public key cryptography
B. asymmetric encryption
C. asymmetric cryptography
D. private key cryptography
Answer: D
Computer Science & Information Technology
You might also like to view...
In Linux, the group database configuration file is ____.
A. /etc/group B. /bin/group C. /etc/bin/group D. /bin/etc/group
Computer Science & Information Technology
In Excel, a Marked as Final document will display ________ in the title bar
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using the Kernel class's ____ method, you can execute an external command or application as a separate process.
A. syscall B. system C. superclass D. status
Computer Science & Information Technology
A ________ sends information between two networks.
A. repeater B. switch C. bridge D. router
Computer Science & Information Technology