Which of the following uses the same key to encrypt and decrypt the data?
a. Symmetric encryption
b. Asymmetric encryption
c. Encryption
d. Cryptographic key
ANS: A
You might also like to view...
Explain why the RPC interface to early implementations of NFS is potentially insecure. The security loophole has been closed in NFS 3 by the use of encryption. How is the encryption key kept secret? Is the security of the key adequate?
What will be an ideal response?
Controls can improve form usability and design
Indicate whether the statement is true or false
What is home automation? What four areas or items in a home can benefit from automation?
What will be an ideal response?
Modern, dedicated security appliances implement ____________________, marrying traditional firewalls with other security services, such as network-based IPS, load balancing, and more.
Fill in the blank(s) with the appropriate word(s).