_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

A. Encrypted signatures
B. Session keys
C. Digital certificates
D. Digital digests


Answer: B. Session keys

Computer Science & Information Technology

You might also like to view...

The number of degrees that an arc traverses from its starting angle is known as the _____________.

a) traversed angle b) size c) arc angle d) None of the above.

Computer Science & Information Technology

Which of the following ISDN equipment can attach directly to the U reference point?

a. only NT1 b. only NT2 c. NT1 & NT12 d. only NT12

Computer Science & Information Technology

It's a smart idea to save repetitive steps as a(n) ____, thereby avoiding time consuming repetition of efforts.

A. agenda B. action C. list item D. story

Computer Science & Information Technology

You can press the ____ keys to open the Find and Replace dialog box.

A. Ctrl+C B. Ctrl+F C. Ctrl+F+R D. Alt+R

Computer Science & Information Technology