Which of the following uses one public and one private key?

A. Private key cryptography
B. Public key cryptography
C. Secret key cryptography
D. Symmetric key cryptography


Answer: B
Explanation: Public key cryptography, also called asymmetric key, uses two keys one private and one public to encrypt and decrypt data.

Computer Science & Information Technology

You might also like to view...

The following items are inserted into a binary search tree: 8, 4, 3, 2, 5, 9, 6, 1, 7 . Which item is placed at a root?

a. 1 b. 4 c. 8 d. 9 e. none of the above

Computer Science & Information Technology

When bridging is used with a satellite link, two bridges are typically used, one on each side. Explain why.

What will be an ideal response?

Computer Science & Information Technology

Cascading Style Sheets allow you to attach an existing style sheet to a web page and use its styles there.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ JPEG format option results in an image that will initially be displayed with little detail and then increases in detail.

a. Progressive b. Baseline Optimized c. Baseline d. Default

Computer Science & Information Technology