Multiple Choice
The opposite of asymmetric encryption is ____ encryption,in which one key is used to encrypt and decrypt.
A) available key
B) asymmetric key
C) symmetric
D) public key
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: A mobile malicious code is also known
Q8: _ is an authentication protocol designed to
Q9: The _ firewall is essentially a router
Q10: A firewall cannot limit users on the
Q11: Because of security concerns,modern network operating systems
Q13: The _ substitution-based cipher uses multiple alphabetic
Q14: How does phishing work?
Q15: To authenticate electronic documents as yours,you need
Q16: Pings are used most commonly by Unix-based
Q17: Many certificates conform to the _ standard.<br>A)