In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A. public key cryptography
B. asymmetric encryption
C. asymmetric cryptography
D. private key cryptography


Answer: D

Computer Science & Information Technology

You might also like to view...

In Linux, the group database configuration file is ____.

A. /etc/group B. /bin/group C. /etc/bin/group D. /bin/etc/group

Computer Science & Information Technology

In Excel, a Marked as Final document will display ________ in the title bar

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using the Kernel class's ____ method, you can execute an external command or application as a separate process.

A. syscall B. system C. superclass D. status

Computer Science & Information Technology

A ________ sends information between two networks.

A. repeater B. switch C. bridge D. router

Computer Science & Information Technology