How many keys are used in symmetric cryptography?
A. One
B. Two
C. Three
D. Four
Answer: A
Computer Science & Information Technology
You might also like to view...
When a form is protected, you can move from one content control to the next by pressing Tab
Indicate whether the statement is true or false
Computer Science & Information Technology
In a network constructed using star topology, all the devices are connecting to one central device known as the:
A. router. B. repeater. C. hub. D. gateway
Computer Science & Information Technology