. Explain how a Trojan horse works.  

. Compare and contrast symmetric and asymmetric encryption.  

 Describe how symmetric encryption and decryption work.