The security administrator wants each user to individually decript a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization?

A. Use of CA certificate
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys


Answer: D. Use of public and private keys

Computer Science & Information Technology

You might also like to view...

Components in Python are called _________ , __________ , and _________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

ERP ___________ systems also benefit businesses by generating forecasting analyses of product consumption based on critical variables such as geographical area, season, day of the week, and type of customer.

A. AI B. CRM C. DSS D. SCM

Computer Science & Information Technology

____ is the process of using people to get the information you want.

Social engineering Hacking Snarfing Phishing

Computer Science & Information Technology

Shortly after ___________ signals stop arriving from a server, another server in the cluster takes over its functions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology