A secret key for symmetric encryption that is generated for use for a short period of time is called a _________ .

A. strategic key
B. sequence key
C. session key
D. stream key

C. session key

Computer Science & Information Technology

You might also like to view...

Having the user input the values directly is the best way to ensure that errors will not be included in the data

Indicate whether the statement is true or false

Computer Science & Information Technology

The simplest method of creating a ________ is with the Analysis Toolpak

A) standard deviation B) distribution chart C) histogram D) frequency chart

Computer Science & Information Technology