Matthew would like to send a private message to Richard using a symmetric cryptosystem. What key should Matthew use to encrypt the message?

a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key


Answer: e. Shared secret key

Computer Science & Information Technology

You might also like to view...

When you create a query, you should follow some general guidelines for query design. What are these six guidelines?

What will be an ideal response?

Computer Science & Information Technology

Inferential statistics and Descriptive statistics are the same thing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Since the ADT heap implementation uses an array and not a linked list, the create heap operation does not need to worry about memory overflow.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Xmas Scan is a port-scan technique with FIN, URG, and PUSH flags set to send a TCP frame to a remote device.

a. true b. false

Computer Science & Information Technology