1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
11

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.

Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
Which of the following steps will you take to resolve this issue?
a. Generate a new public and private key.
b. Disable email encryption.
c. Send your private key to the accountants.
d. Have the accounting company send their private key to you.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

You might be interested in
The purpose of a flowchart is similar to the purpose of pseudocode.<br> True<br> False
11111nata11111 [884]
I would say true. They both exist to provide people with a reference point.
6 0
3 years ago
Read 2 more answers
 A number of companies and/or agencies, such as National ____ and Atmospheric Administrationâs National Weather Service, provid
LekaFEV [45]

Answer: D) Oceanic

Explanation:

National oceanic and the atmospheric administration (NOAA)are the national weather services which basically provide the weathering conditions and forecast them on their particular websites.

NOAA is basically responsible for monitoring or environment and climate. this agency is situated in the united state at washington headquarter. It also helps to preserve the climate by taking some effective steps for our environment.  

4 0
4 years ago
A _____________ is a set of instructions used to perform calculations in a cell.
Elina [12.6K]
Formula 

Explanation: A formula is inserted into a cell and the cell then follows the instructions of the formula to come to an answer.
8 0
4 years ago
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
4 years ago
Manipulating graphic images to perform a command has replaced the ____ user interface.
Alekssandra [29.7K]

Answer:

The answer is "Command-based".

Explanation:

CLI stands for the command-line interface, it is also known as the command-based user interface. CLI is a text interface that allows the user to react to visual prompts by typing individual commands in the interface and receiving the same response.

  • It is available on Microsoft windows.
  • CLI is the way that is used by users to interact with computer programs.

3 0
3 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • TRUE OR FALSE!!!!!
    6·2 answers
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • The natural functions of Earth seem all _____ in one way or another.
    9·1 answer
  • Want summmmmmmm bec i do lol
    9·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • Discuss at least two challenges students face when conducting research on the Internet.
    7·2 answers
  • If the code for JAVA is LCXC, what is the code for BASIC?
    12·1 answer
  • Elena wrote the following code in Scratch to have the sprite move and then turn around. However, the code does not work as expec
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!