Question
To whom is a public key available? a. No one it is stored locally on the device. b. Anyone in the environment c. Users who
To whom is a public key available?
a. No one it is stored locally on the device. b. Anyone in the environment c. Users who know the password d. A certificate authority
Which of the following would you encrypt by using drive encryption technologies such as LUKS and BitLocker?
a. A file transferred via FTP b. An entire drive during shutdown c. Email d. Web traffic
Encryption can be used to guarantee file integrity. Which statement BEST describes what file integrity guarantees?
a. The file is good for business. b. The file has not changed. c. The file was downloaded from a trusted source. d. The file has been successfully backed up.
How is hash cryptography used to guarantee integrity?
a. The original file and the copied file are both run through the hash algorithm. If the result is identical, the files are identical. b. Personal information is encrypted by using the hash on the source computer, and then decrypted on the destination computer. c. An exchange of public and private keys guarantees the identity of the web server.
A digital signature is encrypted by using the user's __ key and decrypted by using the user's __ key.
a. Public / Private b. Hash / Dehash c. Symmetric / Asymmetric d. Private / Public e. Asymmetric / Symmetric
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started