Question

Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the...

Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?

  • A. Encrypt it with Joe's private key
  • B. Encrypt it with Joe's public key
  • C. Encrypt it with Ann's private key
  • D. Encrypt it with Ann's public key
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Ans: D.Encrypt it with Ann's public key,

the sender has to encrypt the document with receiver's public key, on receiver end it is decrypted by his private key, this way no other who is in between can view the content, thus protecting it from eavesdropping.

Add a comment
Know the answer?
Add Answer to:
Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings...

    Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...

  • 35) Biometrics are an example of a) something the user is b) something the user wants....

    35) Biometrics are an example of a) something the user is b) something the user wants. c) something the user has. d) something the user knows e) something the user does 36) Bob is using public key encryption to send a message to Ted Bob encrypts the message with Ted's key, and Ted decrypts the message using his key a) public, public b) public, private c) private, private d) private, public e) none of these 37) Which of the following...

  • A security engineer wants to add SSL to the public web server. Which of the following...

    A security engineer wants to add SSL to the public web server. Which of the following would be A. Download the web certificateB. Install the intermediate certificateC. Generate a CSRD. Encrypt the private key A security engineer wants to add SSL to the public web server. Which of the following would be the On Download the web certificate Install the intermediate certificate. Generate a CSR. Encrypt the private key.

  • secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B:...

    secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...

  • Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...

    Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...

  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

  • Computer Engineering 4. (20 pts) If a user of a comms system wants to utilize the...

    Computer Engineering 4. (20 pts) If a user of a comms system wants to utilize the RSA public key encryption with p = 11 and q = 7 find their public and private keys and encrypt the message, “cyber”, using the numeric value of 1 to represent an 'a', 2 = 'b', etc. Also, show the first step in the deciphering process of this message by the user (i.e. show the first calculation based off of the received cipher for...

  • 8:38 A software developer wants to ensure that the application is verifying that a key is...

    8:38 A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.) A. Escrowed keys B. SSL symmetric encryption key C. Software code private key D. Remote server public key A Chief Information Security Officer (CISO) for a school district wants to enable SSL to protect all of the public-facing servers in...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Discrete Math 1. Use the primes P1 = 3 and P2 = 17 and the value...

    Discrete Math 1. Use the primes P1 = 3 and P2 = 17 and the value E = 3 with the RSA algorithm to compute the values below needed to get the keys: What is the value of N? What is the value of Z? What is the value of D? (ABET 5) Using the values from the problem 9) above, show how to encrypt the message, M = 44. Do NOT simplify, just show the computation needed to encrypt...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT