Asymmetric encryption can be used for __________ .

A. both confidentiality and authentication
B. neither confidentiality nor authentication
C. confidentiality
D. authentication


A. both confidentiality and authentication

Computer Science & Information Technology

You might also like to view...

___________ is attached to the class of the composing class to denote the aggregation relationship with the composed object.

a. An empty diamond b. A solid diamond c. An empty oval d. A solid oval

Computer Science & Information Technology

Telegraphy remained the major technology for intercontinental communication well into the ________.

A. 1930s B. 1940s C. 1950s D. 1960s

Computer Science & Information Technology

What types of document properties does PowerPoint automatically update?

What will be an ideal response?

Computer Science & Information Technology

?A TEMPEST facility is designed to accomplish which of the following goals?

A. ?Prevent data loss by maintaining consistent backups. B. ?Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions. C. ?Ensure network security from the Internet using comprehensive security software. D. ?Protect the integrity of data.

Computer Science & Information Technology