Which of the following is true about symmetric encryption?
A. It uses a secret key to encrypt and decrypt.
B. It uses a private and public key.
C. It is also known as public key encryption.
D. It requires four keys to hold a conversation.
Answer: A
You might also like to view...
In order to perform file processing in C++, which header files must be included?
a.
This symbol is often used to describe syntactic structures.
a. # b.< > c. ( ) d. { }
What is the sphere of influence? Identify three spheres of influence.
What will be an ideal response?
In a cost-benefit analysis, the calculated value associated with the most likely loss from an attack (impact) is known as __________. It is the product of the asset's value and the exposure factor.
Fill in the blank(s) with the appropriate word(s).