Alice sends a message to Bob and wants to ensure that Mal, a third party, does not read the contents of the message while in transit. What goal of cryptography is Alice attempting to achieve?
A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation
Answer: A. Confidentiality
You might also like to view...
In a list implementation of a stack, the end of the list at which elements are added and removed is called
A) the active end of the stack B) the head of the stack C) the top of the stack D) the bottom of the stack
The best online polls reflect the pollster's bias.
Answer the following statement true (T) or false (F)
What contains the destination and source port numbers used to identify Application-layer protocols, and is the Transport-layer data unit?
A. frame B. packet C. segment D. data unit
Show that the distance measure defined as the angle between two data vec- tors, x and y, satisfies the metric axioms given on page 70. Specifically, d(x, y) = arccos(cos(x, y)).
What will be an ideal response?