How many keys are used in symmetric cryptography?

A. One
B. Two
C. Three
D. Four

Answer: A

Computer Science & Information Technology

You might also like to view...

When a form is protected, you can move from one content control to the next by pressing Tab

Indicate whether the statement is true or false

Computer Science & Information Technology

In a network constructed using star topology, all the devices are connecting to one central device known as the:

A. router. B. repeater. C. hub. D. gateway

Computer Science & Information Technology