When there is no shared secret and large quantities of sensitive information must be passed, it is more efficient to use a hybrid encryption technique to transfer information. What does this mean?

A. Use of the recipient's public key for encryption and decryption based on the recipient's private key
B. Use of public key encryption to secure a secret key, and message encryption using the secret key
C. Use of software encryption assisted by a hardware encryption accelerator
D. Use of elliptic curve encryption


B. Use of public key encryption to secure a secret key, and message encryption using the secret key

Computer Science & Information Technology

You might also like to view...

Variables declared with the Integer, Decimal, and Double data types can store numbers only.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?A _________ is a set of controls grouped together in a form or report so that you can manipulate the set as a single control. A. control layout B. control group C. control pane D. control form

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements about queue insertion is true?

A. Queue insertion takes place at the front of the queue. B. If there is not enough room in memory for another node, the queue is in an overflow state.     C. When a node is inserted, only the front pointer needs to be adjusted. D. Queue insertion requires a search algorithm to locate the insertion position within the list. E. Each node in a queue points to its predecessor.

Computer Science & Information Technology

If you want all objects to share a single nonchanging value, then the field is static and ______.

A. end B. final C. permanent D. class

Computer Science & Information Technology