Alice sends a message to Bob and wants to ensure that Mal, a third party, does not read the contents of the message while in transit. What goal of cryptography is Alice attempting to achieve?

A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation


Answer: A. Confidentiality

Computer Science & Information Technology

You might also like to view...

In a list implementation of a stack, the end of the list at which elements are added and removed is called

A) the active end of the stack B) the head of the stack C) the top of the stack D) the bottom of the stack

Computer Science & Information Technology

The best online polls reflect the pollster's bias.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What contains the destination and source port numbers used to identify Application-layer protocols, and is the Transport-layer data unit?

A. frame B. packet C. segment D. data unit

Computer Science & Information Technology

Show that the distance measure defined as the angle between two data vec- tors, x and y, satisfies the metric axioms given on page 70. Specifically, d(x, y) = arccos(cos(x, y)).

What will be an ideal response?

Computer Science & Information Technology