Question
a.
Allows only the correct receiver to decode the data
b.
Allows only one to decode the transmission
c.
Allows only the correct sender to decode the data
d.
Does not encode the data before transmitting it
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. A public key encryption system
Similar Questions
Discover Related MCQs
Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
View solution
Q. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
View solution
Q. Which of the following are forms of malicious attack ?
View solution
Q. What are common security threats ?
View solution
Q. From the following, which is not a common file permission ?
View solution
Q. Which of the following is a good practice ?
View solution
Q. What is not a good practice for user administration ?
View solution
Q. Which of the following is least secure method of authentication ?
View solution
Q. Which of the following is a strong password ?
View solution
Q. Why is one time password safe ?
View solution
Q. What does Light Directory Access Protocol (LDAP) doesn’t store ?
View solution
Q. What is characteristic of RADIUS system ?
View solution
Q. Which happens first authorization or authentication ?
View solution
Q. What is characteristics of Authorization ?
View solution
Q. What forces the user to change password at first logon ?
View solution
Q. What is not a best practice for password policy ?
View solution
Q. What is breach of integrity ?
View solution
Q. What is breach of confidentiality ?
View solution
Q. What is theft of service ?
View solution
Q. What is breach of availability ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!