Which of the following is true about asymmetric cryptography?
A. the private key can be used to encrypt and decrypt a message
B. a shared key is used to encrypt all messages and the private key decrypts them
C. a single key is used and is transferred using a key management system
D. the public key is used to encrypt a message sent to the private key owner
Answer: D
You might also like to view...
What is the purpose of coding the algorithm into instructions written in a programming language?
A. It allows the computer to implement it. B. It helps integrate the circuits. C. It forces the user to learn a new programming language. D. It instructs the computer on what not to do.
In the figure above, item 1 shows you where to create a(n) ____.
A. custom library B. Manage library icon C. library folder D. "real" location
A paragraph-ending line that appears by itself at the top of a page is called a(n) ________
A) endnote B) widow C) footnote D) orphan
How does a RADIUS server respond to an authentication request from a supplicant?
What will be an ideal response?