Which of the following is true about symmetric encryption?

A. It uses a secret key to encrypt and decrypt.
B. It uses a private and public key.
C. It is also known as public key encryption.
D. It requires four keys to hold a conversation.


Answer: A

Computer Science & Information Technology

You might also like to view...

In order to perform file processing in C++, which header files must be included?

a. , and . b. and . c. and . d. and .

Computer Science & Information Technology

This symbol is often used to describe syntactic structures.

a. # b.< > c. ( ) d. { }

Computer Science & Information Technology

What is the sphere of influence? Identify three spheres of influence.

What will be an ideal response?

Computer Science & Information Technology

 In a cost-benefit analysis, the calculated value associated with the most likely loss from an attack (impact) is known as __________. It is the product of the asset's value and the exposure factor.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology