Alice is designing a cryptosystem for use by six users and would like to use a symmetric encryption algorithm. She wants any two users to be able to communicate with each other without worrying about eavesdropping by a third user. How many symmetric encryption keys will she need to generate?

A. 6
B. 12
C. 15
D. 30


Answer: C. 15

Computer Science & Information Technology

You might also like to view...

An electronic ____ is an object you use to enter, update, and print records in a database.

A. page B. form C. control D. report

Computer Science & Information Technology

Every shape in a SmartArt graphic has a(n) ________ where the user can enter a label

A) text placeholder B) Smart Guide C) Alignment Guide D) Anchor

Computer Science & Information Technology

Another way to select a range of cells is to use the arrow keys while holding down the [Ctrl] key

Indicate whether the statement is true or false.

Computer Science & Information Technology

What is the most common port used when connecting an Internet Explorer browser to a proxy server for use with HTTP connections?

A. 53 B. 80 C. 443 D. 21

Computer Science & Information Technology