Which of the following uses one public and one private key?

A. Private key cryptography
B. Public key cryptography
C. Secret key cryptography
D. Symmetric key cryptography

Answer: B
Explanation: Public key cryptography, also called asymmetric key, uses two keys one private and one public to encrypt and decrypt data.

Computer Science & Information Technology

You might also like to view...

When pictures are included in a blog, they are stored:

A) as a placeholder in the text file. B) as a separate file that is unrelated to the blog. C) together with the text of the blog as one file. D) as a separate file with a link in to the text file.

Computer Science & Information Technology

Which of the following is a built-in operation on classes?

A. increment B. assignment C. decrement D. relational operators

Computer Science & Information Technology