_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
A. Encrypted signatures
B. Session keys
C. Digital certificates
D. Digital digests
Answer: B. Session keys
Computer Science & Information Technology
You might also like to view...
The number of degrees that an arc traverses from its starting angle is known as the _____________.
a) traversed angle b) size c) arc angle d) None of the above.
Computer Science & Information Technology
Which of the following ISDN equipment can attach directly to the U reference point?
a. only NT1 b. only NT2 c. NT1 & NT12 d. only NT12
Computer Science & Information Technology
It's a smart idea to save repetitive steps as a(n) ____, thereby avoiding time consuming repetition of efforts.
A. agenda B. action C. list item D. story
Computer Science & Information Technology
You can press the ____ keys to open the Find and Replace dialog box.
A. Ctrl+C B. Ctrl+F C. Ctrl+F+R D. Alt+R
Computer Science & Information Technology