Select an encryption method that uses a single shared, private key.

a. Symmetric Encryption
b. Asymmetric Encryption
c. Hash Algorithm
d. Security Lock Encryption


a. Symmetric Encryption

Computer Science & Information Technology

You might also like to view...

When working with contacts in any view, you can ____________________ the contacts to display them in a different order.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using the format menu, you can use the ____ option to make two or more controls the same width and/or height.

A. Duplicate Size B. Same Size C. Make Same D. Make Same Size

Computer Science & Information Technology

You can assign ____ values in the Input Tag Accessibility Attributes dialog box when you create a tag.

A. Tab Order B. Tab Index C. Logic D. Page Pathway

Computer Science & Information Technology

Tabbed browsing enables you to open multiple Web sites in multiple windows

Indicate whether the statement is true or false

Computer Science & Information Technology