The security administrator wants each user to individually decript a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization?

A. Use of CA certificate
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys

Answer: D. Use of public and private keys

Computer Science & Information Technology

You might also like to view...

What causes computer vision syndrome?

A) Glasses that are not specifically for use with computer monitors B) A low-resolution monitor C) Improper placement of the monitor D) Small screen size

Computer Science & Information Technology

Which of the following is NOT true about customizing a report?

A) Reports created by the wizard can be easily customized after they have been created and saved. B) Themes can be applied to just the report or the whole database to change the colors, fonts, or both. C) Controls, bound and unbound, can be added or modified on the report to make room for more information or to rearrange the information already there. D) To break a report into smaller sections, grand totals or sorts may be added.

Computer Science & Information Technology