Tim sent a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Kellie use to decrypt the message?
What will be an ideal response?
Kellie's private key
You might also like to view...
Which of the following is NOT a critical goal of information security?
A. confidentiality B. scalability C. authentication D. nonrepudiation
Infrared can be broadcast in a single direction or in all directions, using a(n) ____ to transmit and a photodiode to receive.
A. antenna B. LED C. laser D. satellite dish
Match each item with a statement below.
A. an IPv4/IPv6-capable computer in which each version of IP accesses a separate Transport layer stack B. a virtual network infrastructure model describing IPv6-capable networks embedded within a larger core IPv4 LAN and communicating with other IPv6 networks using a tunneling technology C. a technology that translates an IP address used in one network, such as a private LAN, to a different IP address used in a different network, such as the public Internet D. a virtual network infrastructure model describing IPv6 nodes existing in a IPv4 core backbone and communicating with each other using a tunneling technology E. a method of verifying that a string is an IP address and, if so, determining if the address is IPv4 or IPv6 F. a route used by a network node to communicate with another network node on the same physical or virtual subnet G. the receiving node at the other end of the tunnel, which is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet H. the route used by a network device to communicate to other devices on a different physical or virtual subnet, leading to the next-hop device, which is typically a router I. a method used by ISATAP nodes to maintain a current list of routes and routers
The keyboard shortcut for undoing an action is Ctrl + ________
A) Z B) X C) A D) Home