Matthew would like to send a private message to Richard using an asymmetric cryptosystem. What key should Matthew use to encrypt the message?

a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key


Answer: c. Richard's public key

Computer Science & Information Technology

You might also like to view...

__________ is concerned with managing the system’s memory resources, allocating space to applications as needed and ensuring that those applications do not interfere with each other.

a. Processor management b. The IOCS c. Memory management d. none of the above

Computer Science & Information Technology

The _________ is the fundamental JavaScript object whose methods are available to all objects.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Like other programs, Java software can run only on specific types of computers.

Indicate whether the statement is true or false.

Computer Science & Information Technology

A minority of businesses monitor employees to some extent. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology