A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第1题:
A.ping
B.Telnet
C.FTP
D.TCP
E.IP
第2题:
第3题:
第4题:
第5题:
第6题: