Questions
Questions

Introduction to Security and Forensic Technologies (CT046-3-1-ISFT-25-RESIT)

Single choice

Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?

Options
A.a. Digital signatures
B.b. Symmetric encryption
C.c. Public-key cryptography
D.d. Hashing
Question Image
View Explanation

View Explanation

Verified Answer
Please login to view
Step-by-Step Analysis
When evaluating how Foo should send a confidential message over an insecure network, it helps to think about what each technique actually provides. Option a: Digital signatures. These are primarily about authenticity and integrity, proving who sent the message and that it hasn’t been alte......Login to view full explanation

Log in for full answers

We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!

More Practical Tools for Students Powered by AI Study Helper

Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!