Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially.Which of the following would explain the situation?

A. An ephemeral key was used for one of the messages
B. A stream cipher was used for the initial email; a block cipher was used for the reply
C. Out-of-band key exchange has taken place
D. Asymmetric encryption is being used


Answer: D. Asymmetric encryption is being used

Computer Science & Information Technology

You might also like to view...

Virtual memory replacement strategies determine ________.

b) how many pages should be added to main memory c) which pages should be brought into memory because a process is likely to reference them soon d) which page or segment to remove to provide space for an incoming page or segment

Computer Science & Information Technology

_____ protects mobile devices from liquids

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____________________ connection is a single wire with the mainframe connected on oneĀ end and multiple terminals connected on the other end.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which one of these is NOT one the three pillars of security in the CIA triangle?

a. Confidentiality b. Integrity c. Availability d. Authentication

Computer Science & Information Technology