Multiple Choice
These systems use the same key to encrypt and to decrypt.
A) Asymmetric encryption
B) Hashing encryption
C) Public key encryption
D) Symmetric encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: On March 3,2008,a laptop computer belonging to
Q5: Jeff Davis took a call from a
Q6: A process that takes plaintext of any
Q7: Jeff Davis took a call from a
Q8: Describe symmetric encryption and identify three limitations.
Q9: Which of the following describes one weakness
Q11: These are used to create digital signatures.<br>A)
Q12: Concerning virtual private networks (VPN),which of the
Q27: The system and processes used to issue
Q37: In developing policies related to personal information