Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.

A. public key certificates
B. session keys
C. master keys
D. private key certificates


B. session keys

Computer Science & Information Technology

You might also like to view...

The Split Form Orientation property can be set in Design view or Layout view

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ contains an additional row in the query design grid and displays aggregate data when the query is run

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a term that describes a log of performance and other indicators taken of a network and its server during normal operations?

A. application log B. system log C. security log D. baseline

Computer Science & Information Technology

A(n) ____________________ is a named location in RAM that can store a value that may change during program execution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology