All the following are properties of asymmetric key encryption except _____.
A) it makes it easy to exchange the encryption key
B) it uses two keys
C) it is computationally simple
D) the key used for encryption cannot be used for decryption
Correct Answer:
Verified
Q1: Information security controls are commonly classified in
Q2: In network security,a firewall is a device
Q3: Controls are _.
A)weaknesses in an information system
Q4: Integrity is defined as _.
A)maintaining restrictions on
Q5: Authentication is _.
A)hiding information
B)providing an alternate identity
C)the
Q7: Vulnerabilities are _.
A)weaknesses in an information system
Q8: Confidentiality is defined as _.
A)guarding against improper
Q9: Availability is defined as _.
A)guarding against improper
Q10: A denial-of-service attack _.
A)blocks traffic from any
Q11: Encryption is the process of _.
A)rendering information
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents