adplus-dvertising
frame-decoration

Question

A public key encryption system

a.

Allows only the correct receiver to decode the data

b.

Allows only one to decode the transmission

c.

Allows only the correct sender to decode the data

d.

Does not encode the data before transmitting it

Posted under Operating System

Answer: (a).Allows only the correct receiver to decode the data

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A public key encryption system

Similar Questions

Discover Related MCQs

Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.

Q. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.

Q. Which of the following are forms of malicious attack ?

Q. What are common security threats ?

Q. From the following, which is not a common file permission ?

Q. Which of the following is a good practice ?

Q. What is not a good practice for user administration ?

Q. Which of the following is least secure method of authentication ?

Q. Which of the following is a strong password ?

Q. Why is one time password safe ?

Q. What does Light Directory Access Protocol (LDAP) doesn’t store ?

Q. What is characteristic of RADIUS system ?

Q. Which happens first authorization or authentication ?

Q. What is characteristics of Authorization ?

Q. What forces the user to change password at first logon ?

Q. What is not a best practice for password policy ?

Q. What is breach of integrity ?

Q. What is breach of confidentiality ?

Q. What is theft of service ?

Q. What is breach of availability ?