Public key cryptography uses which of the following?
A. A shared key
B. A public key
C. A private key
D. Both a public and a private key
Answer: D
Explanation: Public key cryptography, also called asymmetric key cryptography, uses two keys: a public key and a private key.
Computer Science & Information Technology
You might also like to view...
Which of the following items below is NOT a cloud service offering?
A) Software-as-a-Service (SaaS) B) Platform-as-a-Service (PaaS C) Business-as-a-Service (BaaS) D) Infrastructure-as-a-Service (IaaS)
Computer Science & Information Technology
If you want to apply slide master changes to other presentations, you must save the presentation as a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology