Multiple Choice
Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A) A message digest.
B) A 16-bit encryption key.
C) A public key and a private key.
D) A digital signature.
Correct Answer:

Verified
Correct Answer:
Verified
Q48: The goal of information security management is
Q49: Which of the following statements is most
Q50: Spam is a self-replicating program that runs
Q51: Which of the following statements is true
Q52: An information technology director collected the names
Q53: One type of fault tolerance is using
Q54: A Trojan Horse is a self-replicating,self-propagating,self-contained program
Q55: Asymmetric-key encryption is suitable for encrypting large
Q56: Encryption is a control that changes plain
Q57: Symmetric-key encryption is rarely used today due