Which of the following uses the same key to encrypt and decrypt the data?

a. Symmetric encryption
b. Asymmetric encryption
c. Encryption
d. Cryptographic key

ANS: A

Computer Science & Information Technology

You might also like to view...

A common use of the type of list shown in the accompanying figure is to create a(n) ____________________, which is a list of events in time order.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ________ is responsible for the development of computer software.

A. database administrator B. network administrator C. software engineer D. computer support specialist

Computer Science & Information Technology