____ is a method for secure key exchange over an insecure channel based on the nature of photons.?

A. ?Skipjack
B. ?Quantum cryptography
C. ?RC4
D. ?IDEA


Answer: B

Computer Science & Information Technology

You might also like to view...

Combining two or more cells in a Quick Table is completed by clicking the ________ button

A) Split Cells B) Merge Cells C) Banded Columns D) Autofit

Computer Science & Information Technology

There are several different categories of privileged information. Which of the following is not an example of privileged information?

a. Notes taken by an investigator at the scene of an investigation b. Doctor/Patient privilege c. Work Product d. Protected intellectual property

Computer Science & Information Technology

Data can be presented in customized and useful ways different from tables and queries by using a Simple ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Online __________ is/are two or more online personas with the same name or user name.

A. sockpuppets B. doppelgangers C. impersonation D. cyberbullying

Computer Science & Information Technology