Public key encryption utilizes two keys-only a person with both keys can encrypt a message or file.
Correct Answer:
Verified
Q116: Spyware is one example of Trojan horse
Q117: Companies can monitor employee e-mail by using
Q118: A Trojan horse a small file created
Q119: Phishing is often used to steal identities
Q120: Spam is unsolicited e-mail that advertises goods
Q122: A Web log is a file stored
Q123: In terms of government legislation and regulation,
Q124: Anonymous Web browsing (AWB) service gives your
Q125: With respect to the circumstances that surround
Q126: Denial-of-service means not being able to log
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents