__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.

A. Asymmetric keys
B. Key exchanges
C. Symmetric keys
D. Cipher keys


A. Asymmetric keys

Computer Science & Information Technology

You might also like to view...

Which of the following is not allowed?

a. Objects of abstract classes. b. Multiple pure virtual functions in a single abstract class. c. References to abstract classes. d. Arrays of pointers to abstract classes.

Computer Science & Information Technology

A(n) ________ is a reserved area for text, graphics, and fields that display at the top of every page of the document

Fill in the blank(s) with correct word

Computer Science & Information Technology

When a file is converted back to its original form, it is said to be:

A) decrypted B) encrypted C) scripted D) coded

Computer Science & Information Technology

What type of connector would be used with CAT 6 cable?

A) S/PDIF B) RJ-11 C) RJ-45 D) ST

Computer Science & Information Technology