When using asymmetric cryptography, what is the purpose of using the recipient's public key to perform an encryption function on a data set before sending it to the recipient?

A. To prove the identity of the sender
B. To verify integrity
C. To restrict delivery
D. To support non-repudiation

Answer: C. To restrict delivery

Computer Science & Information Technology

You might also like to view...

A series of rows that contains related data with column titles in the first row is known as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Selection criteria can be added to a SQL query using which keyword?

a. FROM. b. WHERE. c. SELECT. d. LIKE.

Computer Science & Information Technology