If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?
A. userB's private key
B. userC's public key
C. userA's public key
D. userC's private key
Answer: B
Computer Science & Information Technology
You might also like to view...
Discuss the problem with strategic management.
What will be an ideal response?
Computer Science & Information Technology
What security feature on a smartphone prevents the device from being used until a passcode is entered?
A. encryption B. tracking C. remote wipe D. lock screen
Computer Science & Information Technology
The logical comparison operator used for "not equals" is >=.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What are data warehousing and data mining? How do businesses use these tools?
What will be an ideal response?
Computer Science & Information Technology