Multiple Choice
All the following are properties of asymmetric key encryption except _____.
A) it makes it easy to exchange the encryption key
B) it uses two keys
C) it is computationally simple
D) the key used for encryption cannot be used for decryption
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Authorization is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q6: Vulnerabilities are _.<br>A)weaknesses in an information system
Q7: Confidentiality is defined as _.<br>A)guarding against improper
Q8: Authentication is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q9: Encryption is the process of _.<br>A)rendering information
Q11: Information security controls are commonly classified in
Q12: In symmetric key encryption _.<br>A)the key used
Q13: Integrity is defined as _.<br>A)maintaining restrictions on
Q14: Threats are _.<br>A)weaknesses in an information system
Q15: Information security is defined as _.<br>A)providing confidentiality,integrity