If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?
A. userB's private key
B. userB's public key
C. userA's public key
D. userA's private key
Answer: A
You might also like to view...
Which of the following are allowed in the third section of the for loop statement?
a. i++ b. i-- c. i +=2 d. cout << "Hello\n" e. all of the above f. none of the above
Answer the following statements true (T) or false (F)
1. The data flow diagram graphically characterizes data processes and flows in a business system. 2. The biggest advantage of the data flow approach lies in the conceptual freedom found in the use of the four symbols. 3. The data flow diagram may be used to analyze the proposed system. 4. An arrow is used to depict an external entity that can give and receive data from the system.
A hard drive can only have one single root directory.
Answer the following statement true (T) or false (F)
The Small Caps effect is turned on in the ________ dialog box
A) Format task pane B) Paragraph C) Tabs D) Font