With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message
a. Code
b. Key
c. Lock
d. Script
Answer B.
You might also like to view...
CMYK images use ____ percent more file space than RGB images.
a. 25 b. 33 c. 66 d. 75
When evaluating a website's content, whether or not the information is up to date is considered part of the ________ element.
A. authority B. objectivity C. accuracy D. currency
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. Penetration test B. Code review C. Vunerability scan D. Brute Force scan
Which of the following is an approach to designing apps and websites that provide an optimal viewing experience across as many devices as possible?
A. Single pane design B. Application templates C. Responsive design D. Multipane apps