__________ is an encryption method designed for signing and encrypting email, which uses both symmetric and asymmetric encryption

a. Data encryption standard
b. Triple data encryption standard
c. Pretty good privacy
d. None of the above

C.

Computer Science & Information Technology

You might also like to view...

A portion of Word document that can be formatted differently from the rest of the document is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is most likely to be used by a LAN?

A. Token ring B. Bluetooth C. IrDA D. NFC

Computer Science & Information Technology