Which of the following uses the same key to encrypt and decrypt the data?

a. Symmetric encryption
b. Asymmetric encryption
c. Encryption
d. Cryptographic key


ANS: A

Computer Science & Information Technology

You might also like to view...

Explain why the RPC interface to early implementations of NFS is potentially insecure. The security loophole has been closed in NFS 3 by the use of encryption. How is the encryption key kept secret? Is the security of the key adequate?

What will be an ideal response?

Computer Science & Information Technology

Controls can improve form usability and design

Indicate whether the statement is true or false

Computer Science & Information Technology

What is home automation? What four areas or items in a home can benefit from automation?

What will be an ideal response?

Computer Science & Information Technology

Modern, dedicated security appliances implement ____________________, marrying traditional firewalls with other security services, such as network-based IPS, load balancing, and more.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology