Public key cryptography uses which of the following?

A. A shared key
B. A public key
C. A private key
D. Both a public and a private key

Answer: D
Explanation: Public key cryptography, also called asymmetric key cryptography, uses two keys: a public key and a private key.

Computer Science & Information Technology

You might also like to view...

Which of the following items below is NOT a cloud service offering?

A) Software-as-a-Service (SaaS) B) Platform-as-a-Service (PaaS C) Business-as-a-Service (BaaS) D) Infrastructure-as-a-Service (IaaS)

Computer Science & Information Technology

If you want to apply slide master changes to other presentations, you must save the presentation as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology