With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message

a. Code
b. Key
c. Lock
d. Script


Answer B.

Computer Science & Information Technology

You might also like to view...

CMYK images use ____ percent more file space than RGB images.

a. 25 b. 33 c. 66 d. 75

Computer Science & Information Technology

When evaluating a website's content, whether or not the information is up to date is considered part of the ________ element.

A. authority B. objectivity C. accuracy D. currency

Computer Science & Information Technology

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

A. Penetration test B. Code review C. Vunerability scan D. Brute Force scan

Computer Science & Information Technology

Which of the following is an approach to designing apps and websites that provide an optimal viewing experience across as many devices as possible?

A. Single pane design B. Application templates C. Responsive design D. Multipane apps

Computer Science & Information Technology