When using asymmetric cryptography, what is the purpose of using the recipient's public key to perform an encryption function on a data set before sending it to the recipient?
A. To prove the identity of the sender
B. To verify integrity
C. To restrict delivery
D. To support non-repudiation
Answer: C. To restrict delivery
Computer Science & Information Technology
You might also like to view...
A series of rows that contains related data with column titles in the first row is known as a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Selection criteria can be added to a SQL query using which keyword?
a. FROM. b. WHERE. c. SELECT. d. LIKE.
Computer Science & Information Technology