____ uses a single secret key to both encrypt and decrypt the file or message.
A. Private key encryption
B. Asymmetric key encryption
C. Public key encryption
D. Synchronous key encryption
Answer: A
You might also like to view...
In a compound logical and (&&) expression, the evaluation of the expression stops once one of the terms of the expression is false. This is known as ______________ evaluation. short-c
Fill in the blank(s) with the appropriate word(s).
The first time you want to connect to a secured network, you are required to enter the correct ____________________.
Fill in the blank(s) with the appropriate word(s).
By default Wireshark is nonpromiscuous
Indicate whether the statement is true or false
A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).
A. 802.1q B. MAC address filtering C. WPA2 Personal D. WPA Enterprise E. 802.1x