How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.
A) Party A creates a single key for a session (called session key) .
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
Correct Answer:
Verified
Q14: The following figure summarizes information items included
Q15: Web browsers including Internet Explorer and Firefox
Q16: MD5 and SHA-1 are standards of:
A) encryption
Q17: Choose an INCORRECT statement about the digital
Q18: Choose the LEAST accurate statement of the
Q19: Choose a CORRECT statement regarding Wi-Fi standards.
A)
Q20: In total, how many different keys should
Q21: The PKI servers of a certificate authority
Q22: The cipher text is _.
A) a message
Q24: Which is CORRECT about hashing?
A) Hashing takes
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents