Alice sends an e-mail that she encrypts with a shared key,which only she and Bob have.Upon receipt Bob decrypts the email and reads it.This application of encryption is an example of
A) Confidentiality
B) Integrity
C) Authentication
D) Nonrepudiation
Correct Answer:
Verified
Q24: The strength of a symmetric encryption is
Q25: The benefit of SHA-1 over MD5 is
Q26: Cryptography is the process of attempting to
Q27: _ is done by comparing the input
Q28: DES,AES,RSA,and ECC are all examples of symmetric
Q30: A(n)_ is a special mathematical function that
Q31: Hiding a text file in a jpg
Q32: Alice sends Bob a message along with
Q33: The Vigenère cipher is a polyalphabetic substitution
Q34: Bob connects to a company web site.His
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents