The security administrator wants each user to individually decript a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization?
A. Use of CA certificate
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys
Answer: D. Use of public and private keys
You might also like to view...
Components in Python are called _________ , __________ , and _________
Fill in the blank(s) with the appropriate word(s).
ERP ___________ systems also benefit businesses by generating forecasting analyses of product consumption based on critical variables such as geographical area, season, day of the week, and type of customer.
A. AI B. CRM C. DSS D. SCM
____ is the process of using people to get the information you want.
Social engineering Hacking Snarfing Phishing
Shortly after ___________ signals stop arriving from a server, another server in the cluster takes over its functions.
Fill in the blank(s) with the appropriate word(s).