Symmetric key encryptions ensure confidentiality and data ____.

A. integrity
B. privacy
C. availability
D. repudiation


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the default maximum TTL value used by traceroute when sending UDP datagrams?

What will be an ideal response?

Computer Science & Information Technology

________ uses special effects applied to the text itself, not to the shape surrounding the text

Fill in the blank(s) with correct word

Computer Science & Information Technology

When text is added to a shape, it becomes a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which TCP/IP port does unified communication use?

Computer Science & Information Technology