Asymmetric encryption can be used for __________ .
A. both confidentiality and authentication
B. neither confidentiality nor authentication
C. confidentiality
D. authentication
A. both confidentiality and authentication
You might also like to view...
___________ is attached to the class of the composing class to denote the aggregation relationship with the composed object.
a. An empty diamond b. A solid diamond c. An empty oval d. A solid oval
Telegraphy remained the major technology for intercontinental communication well into the ________.
A. 1930s B. 1940s C. 1950s D. 1960s
What types of document properties does PowerPoint automatically update?
What will be an ideal response?
?A TEMPEST facility is designed to accomplish which of the following goals?
A. ?Prevent data loss by maintaining consistent backups. B. ?Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions. C. ?Ensure network security from the Internet using comprehensive security software. D. ?Protect the integrity of data.