Which of the following is the most correct in a digitally signed message transmission using a hash function?
A. The hash and the message are encrypted by the receiver's private key.
B. The hash and the message are encrypted by the receiver's public key.
C. The sender's public key encrypts the message.
D. The sender's private key encrypts the hash.
Answer: D. The sender's private key encrypts the hash.
You might also like to view...
List three practical consequences arising from unsolvable programs related to the halting problem.
Fill in the blank(s) with the appropriate word(s).
A hardware failure affects a server in a datacenter. The server is critical to company operation, and the hardware vendor is out of stock on the parts needed to repair the server. A network technician suggests replacing it with a server from the warm site. Which of the following should the technician do FIRST?
A. Outsource a hardware-certified courier to move the server to the datacenter. B. Check the DRP and BCP and talk to the company stakeholders before making the decision. C. Unrack the server from the warm site and move it to the datacenter. D. Order the parts from the hardware vendor and notify affected users that the server will be down.
An array with m rows and n columns is not ________. A. an m-by-n array. B. an n-by-m array. C. a two-dimensional array. D. a dual-transcripted array.
a. A and C. b. A and D. c. B and D. d. B and C.
List the five modes in a Bluetooth piconet.
What will be an ideal response?