In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.

A. public key cryptography
B. asymmetric encryption
C. asymmetric cryptography
D. private key cryptography


Answer: D

Computer Science & Information Technology

You might also like to view...

The page table for each process maintains _________ .

A) ?the physical memory location of the process B) ?the frame location for each page of the process C) ?the page location for each frame of the process D) ?the logical memory location of the process

Computer Science & Information Technology

What is the Big-Oh of the method lineDetect?

What will be an ideal response?

Computer Science & Information Technology

Class members are accessed via _________ the operator in conjunction with the name of an object (or reference to an object) of the class or via the _______ operator in conjunc- tion with a pointer to an object of the class.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Information that is stored in rows and columns is referred to as a(n) ________

A) table B) array C) chart D) record

Computer Science & Information Technology