In ____ encryption, the single key must be shared between the individuals wishing to protect their data.

A. asymmetric
B. public key
C. symmetric
D. shareable


Answer: C

Computer Science & Information Technology

You might also like to view...

Files in the /boot directory are considered to be ____ files.

A. static B. variable C. shareable D. unshareable

Computer Science & Information Technology

Match the following terms to their meanings:

I. The value axis A compares two or more sets of data in one chart II. A single data series chart B. is a key that identifies the color, gradient, picture, texture, or pattern fill assigned to each data series in a chart III. A multiple data series chart C. displays incremental values to identify the values of the data series IV. A clustered column chart D. compares values for one set of data V. A legend E. groups or clusters similar data in columns to compare values across categories

Computer Science & Information Technology

Which if the following statements best describes declassification?

A. The process of downgrading a classification B. The process of upgrading a classification C. The process of removing a classification D. The process of assigning a new classification

Computer Science & Information Technology

A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?

A. Static IP addresses B. Wireless encryption C. MAC filtering D. Antenna placement E. Power levels

Computer Science & Information Technology