When using asymmetric cryptography, what is the purpose of using the recipient's public key to perform an encryption function on a data set before sending it to the recipient?

A. To prove the identity of the sender
B. To verify integrity
C. To restrict delivery
D. To support non-repudiation


Answer: C. To restrict delivery

Computer Science & Information Technology

You might also like to view...

The Screenshot Tool enables you to capture a full desktop screen, a window, a rectangular portion of a screen, or a free-form shape on the screen

Indicate whether the statement is true or false

Computer Science & Information Technology

What happens in a method if there is an exception thrown in a try block but there is no catch block following the try block?

A. The program ignores the exception. B. The program will not compile without a complete try/catch structure. C. The program terminates immediately. D. The program throws an exception and proceeds to execute the finally block.

Computer Science & Information Technology

Which of the following is NOT a medium used for storing digital images?

a. Internal memory b. SD card c. CompactFlash card d. None of the above

Computer Science & Information Technology

____ is a queue reordering technique that can help optimize I/O times.

A. Rescheduling B. Blocking C. Buffering D. Prioritizing

Computer Science & Information Technology