A. A security hole, inserted at programming time in the system for later use B. A type of antivirus C. Security hole in a network D. None of the mentioned
A. Same key is used for encryption and decryption B. Different keys are used encryption and decryption C. No key is required for encryption and decryption D. None of the mentioned