Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What do symmetric encryption algorithms use to encrypt and decrypt information?
- A digital certificate
- A public and private key pair
- A hash value
- A single secret key
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What do symmetric encryption algorithms use to encrypt and decrypt information?