Describe symmetric encryption.

What will be an ideal response?


In symmetric encryption, the single key must be shared between the individuals wishing to protect their data. If the key falls into the wrong hands the encrypted data are vulnerable as anyone with a copy of the key can decrypt the information.

Computer Science & Information Technology

You might also like to view...

Any characters included in a ____________________ class represent alternate characters that are allowed in a pattern match.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In _____ notation the operator comes between the operands.

A. prefix B. infix C. postfix D. rpn

Computer Science & Information Technology

Sara, a security administrator, examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90). Which of the following attack types has occurred?

A. Buffer overflow B. Cross-site scripting C. XML injection D. SQL injection

Computer Science & Information Technology

Dreamweaver always inserts a new tab ____.

A. immediately to the right of the selected tab B. at the far right of all tabs C. immediately to the left of the selected tab D. at the far left of all tabs

Computer Science & Information Technology