A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?
A. Symmetric
B. Session-based
C. Hashing
D. Asymmetric
Answer: A. Symmetric
You might also like to view...
Create a new method that will blend two pictures with 20% from just the first picture and a 60% overlap and then 20% from the just the last picture. It helps if the two pictures are the same width and height.
What will be an ideal response?
A(n) eventĀ is an indication that a system has just been attacked or is under attack. _________________________
Answer the following statement true (T) or false (F)
The most powerful, and most common, approach to countering the threats to network security is ________.
Fill in the blank(s) with the appropriate word(s).
Where is the All Apps button found?
a. In the Favorites tray b. In the Home tray c. In the Navigation tray d. In the Recents tray