Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secure message to UserB. What occurs first?

A. UserB sends a shared secret to UserA
B. UserB sends UserA UserB's public key
C. UserA sends UserB UserA's private key
D. UserA sends a secret key to UserB


Answer: B

Computer Science & Information Technology

You might also like to view...

In a split database, typically, the file containing the back end would reside on the ________ that all departments can access

A) network server B) web browser C) internet D) Navigation Pane

Computer Science & Information Technology

You must be logged in as the ____________________ user or have DROP privileges to delete a database.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Starting a loop with a preset value for the variable tested in the condition is called priming the loop.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the figure above, identify the element of the Layers panel labeled "C."

What will be an ideal response?

Computer Science & Information Technology