Richard received a message from Matthew that was encrypted using an asymmetric cryptosystem. What key should Richard use to decrypt the message?

a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key


Answer: d. Richard's private key

Computer Science & Information Technology

You might also like to view...

When a piece of data such as 23 or “Hello” is written into a program’s code, it is called a ____________.

a. constant b. sentinel c. value d. literal

Computer Science & Information Technology

The default Administrator account is the account most sought by hackers

Indicate whether the statement is true or false.

Computer Science & Information Technology

Both out and ref parameter types cause a method to refer to the same variable that was passed into the method.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) query function contains a collection of statements that can be referenced throughout the query document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology