____ uses a single secret key to both encrypt and decrypt the file or message.

A. Private key encryption
B. Asymmetric key encryption
C. Public key encryption
D. Synchronous key encryption


Answer: A

Computer Science & Information Technology

You might also like to view...

In a compound logical and (&&) expression, the evaluation of the expression stops once one of the terms of the expression is false. This is known as ______________ evaluation. short-c

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The first time you want to connect to a secured network, you are required to enter the correct ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

By default Wireshark is nonpromiscuous

Indicate whether the statement is true or false

Computer Science & Information Technology

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

A. 802.1q B. MAC address filtering C. WPA2 Personal D. WPA Enterprise E. 802.1x

Computer Science & Information Technology