What is another name for asymmetric cryptography?
A. Secret key cryptography
B. Private encryption
C. Unbalanced encryption
D. Public key cryptography
Answer: D
You might also like to view...
The commands [Ctrl-a] and [Ctrl-e] move the cursor on the current line to _ _ _ _ of the line respectively.
a: end and center b: end and beginning c: beginning and end d: top and left e: top and right
The generic Plugin button is available in the Flash Button list in the Common category of the Insert panel.
Answer the following statement true (T) or false (F)
A regular session called a "basic session" in Hyper-V, redirects only screen, mouse, and keyboard I/O from the guest to the Virtual Machine Connection console.
Answer the following statement true (T) or false (F)
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.
A. hackers B. script kiddies C. crackers D. warchalkers