What is an example of symmetric key encryption?

A. MD5
B. RSA
C. AES
D. ECC


Answer: C. AES

Computer Science & Information Technology

You might also like to view...

On a printout, a(n) ____ is represented by a drop of ink.

A. pixel B. dot C. image D. graphic

Computer Science & Information Technology

Merge fields are inserted into the data source file

Indicate whether the statement is true or false

Computer Science & Information Technology

A user needs to use BitLocker to encrypt the drive on a laptop that will contain sensitive information. Unfortunately, the laptop does not have a TPM. Which of the following options will enable the laptop to be used with BitLocker? (choose all that apply)

a. Insert a TPM card into the SmartCard reader. b. Change Group Policy settings. c. Reformat the system drive with BitLocker enabled. d. Use an external USB thumb drive (USB key).

Computer Science & Information Technology

A(n) ____________________ is a user-defined name for a memory location whose value can change over time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology