If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

A. userB's private key
B. userB's public key
C. userA's public key
D. userA's private key


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following are allowed in the third section of the for loop statement?

a. i++ b. i-- c. i +=2 d. cout << "Hello\n" e. all of the above f. none of the above

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The data flow diagram graphically characterizes data processes and flows in a business system. 2. The biggest advantage of the data flow approach lies in the conceptual freedom found in the use of the four symbols. 3. The data flow diagram may be used to analyze the proposed system. 4. An arrow is used to depict an external entity that can give and receive data from the system.

Computer Science & Information Technology

A hard drive can only have one single root directory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Small Caps effect is turned on in the ________ dialog box

A) Format task pane B) Paragraph C) Tabs D) Font

Computer Science & Information Technology