Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.

A. public key certificates
B. session keys
C. master keys
D. private key certificates

B. session keys

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Referential integrity II. Test string III. Property Sheet IV. Between ... And V. Aggregate function A. looks for values within a range B. SUM, AVG, MIN, and MAX are examples C. sequence of characters used as criteria in a query D. ensures that data in a related table is valid E. used to customize fields in a query

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. True/False: The last step in the program development cycle is to code the program. 2. True/False: A prompt is used in a program to tell the user to enter some data. 3. True/False: A variable is the name for a storage location in the computer’s internal memory.

Computer Science & Information Technology