In ____ encryption, the single key must be shared between the individuals wishing to protect their data.
A. asymmetric
B. public key
C. symmetric
D. shareable
Answer: C
You might also like to view...
Files in the /boot directory are considered to be ____ files.
A. static B. variable C. shareable D. unshareable
Match the following terms to their meanings:
I. The value axis A compares two or more sets of data in one chart II. A single data series chart B. is a key that identifies the color, gradient, picture, texture, or pattern fill assigned to each data series in a chart III. A multiple data series chart C. displays incremental values to identify the values of the data series IV. A clustered column chart D. compares values for one set of data V. A legend E. groups or clusters similar data in columns to compare values across categories
Which if the following statements best describes declassification?
A. The process of downgrading a classification B. The process of upgrading a classification C. The process of removing a classification D. The process of assigning a new classification
A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
A. Static IP addresses B. Wireless encryption C. MAC filtering D. Antenna placement E. Power levels