Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

Fill in the blank(s) with the appropriate word(s).

symmetric encryption

Computer Science & Information Technology

You might also like to view...

_______ refers to the networks and network management functionality that must be in place to enable cloud computing.

A) Cloud networking B) Cloud storage C) Cloud broker D) Cloud carrier

Computer Science & Information Technology

A(n) ____ often can help convey relationships between key points in your presentation.

A. illustration B. slide background color C. text box D. worksheet

Computer Science & Information Technology