Which of the following uses one public and one private key?
A. Private key cryptography
B. Public key cryptography
C. Secret key cryptography
D. Symmetric key cryptography
Answer: B
Explanation: Public key cryptography, also called asymmetric key, uses two keys one private and one public to encrypt and decrypt data.
Computer Science & Information Technology
You might also like to view...
When pictures are included in a blog, they are stored:
A) as a placeholder in the text file. B) as a separate file that is unrelated to the blog. C) together with the text of the blog as one file. D) as a separate file with a link in to the text file.
Computer Science & Information Technology
Which of the following is a built-in operation on classes?
A. increment B. assignment C. decrement D. relational operators
Computer Science & Information Technology