Alice is designing a cryptosystem for use by six users and would like to use a symmetric encryption algorithm. She wants any two users to be able to communicate with each other without worrying about eavesdropping by a third user. How many symmetric encryption keys will she need to generate?
A. 6
B. 12
C. 15
D. 30
Answer: C. 15
Computer Science & Information Technology
You might also like to view...
An electronic ____ is an object you use to enter, update, and print records in a database.
A. page B. form C. control D. report
Computer Science & Information Technology
Every shape in a SmartArt graphic has a(n) ________ where the user can enter a label
A) text placeholder B) Smart Guide C) Alignment Guide D) Anchor
Computer Science & Information Technology
Another way to select a range of cells is to use the arrow keys while holding down the [Ctrl] key
Indicate whether the statement is true or false.
Computer Science & Information Technology
What is the most common port used when connecting an Internet Explorer browser to a proxy server for use with HTTP connections?
A. 53 B. 80 C. 443 D. 21
Computer Science & Information Technology