What is another name for asymmetric cryptography?

A. Secret key cryptography
B. Private encryption
C. Unbalanced encryption
D. Public key cryptography


Answer: D

Computer Science & Information Technology

You might also like to view...

The commands [Ctrl-a] and [Ctrl-e] move the cursor on the current line to _ _ _ _ of the line respectively.

a: end and center b: end and beginning c: beginning and end d: top and left e: top and right

Computer Science & Information Technology

The generic Plugin button is available in the Flash Button list in the Common category of the Insert panel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A regular session called a "basic session" in Hyper-V, redirects only screen, mouse, and keyboard I/O from the guest to the Virtual Machine Connection console.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.

A. hackers B. script kiddies C. crackers D. warchalkers

Computer Science & Information Technology