Richard received a message from Matthew that was encrypted using an asymmetric cryptosystem. What key should Richard use to decrypt the message?
a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key
Answer: d. Richard's private key
You might also like to view...
When a piece of data such as 23 or “Hello” is written into a program’s code, it is called a ____________.
a. constant b. sentinel c. value d. literal
The default Administrator account is the account most sought by hackers
Indicate whether the statement is true or false.
Both out and ref parameter types cause a method to refer to the same variable that was passed into the method.
Answer the following statement true (T) or false (F)
A(n) query function contains a collection of statements that can be referenced throughout the query document.
Answer the following statement true (T) or false (F)