Correct Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Internet Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Internet Security MCQ Questions
Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
An SQL injection is often used to attack what?
Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
If you set up a BUS network, what is the major disadvantage?
Which of the following is a valid flaw of SSL 2.0 ?
Which protocol does not help in securing the FTP?
The part of a company’s intranet which is extended to users outside the company is called:
Which protocol is used to secure the WAP communication?
Mike wants to secure the data on his personal computer. Which option will he choose to secure the data?
By which can the injection of bogus routes into the core network be prevented ?