In public key encryption, which item is kept by the owner of the key?
a. Public key
b. Private key
c. Digital key
d. Rootkit
Who is an individual that deliberately attempts to obtain unauthorized access to a computer or network system with the intent to do harm?
a. Zombie
b. Bot
c. Hacker
d. Cracker
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here