If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?
A. userB's private key
B. userC's public key
C. userA's public key
D. userC's private key
Answer: B
Computer Science & Information Technology
You might also like to view...
A moderated chat room ensures that ________
A) parental controls are in effect B) all content is screened C) only subscribers participate D) no one under the age of 18 is online
Computer Science & Information Technology
Group Policy __________are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information
a. Templates b. Definitions c. Containers d. Objects
Computer Science & Information Technology