Which of the following statements about asymmetric key cryptography is true?

A) Asymmetric key cryptography uses one shared key.
B) Asymmetric key cryptography is also called private key cryptography.
C) Asymmetric key cryptography uses two keys called public keys.
D) Asymmetric key cryptography is also called public key cryptography.


D) Asymmetric key cryptography is also called public key cryptography.

Computer Science & Information Technology

You might also like to view...

String labels allow you to associate a frame with a name so when ActionScript runs the code, it refers to the frame name, not the frame number.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Copies of files or folders that you back up by using the Back Up Files wizard are called:

A) restore points B) shadow copies C) previous versions D) Windows Complete PC Backup

Computer Science & Information Technology

Which programming language creates programs that a browser can run to generate content for a website??

A. ?Ada B. ?WordPress C. ?Drupal D. ?JavaScript

Computer Science & Information Technology

?Companies use various _____ methods to maintain output integrity and security.

A. ?output stream B. ?output aesthetic C. ?output control D. ?output data

Computer Science & Information Technology