1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
11

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.

Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
Which of the following steps will you take to resolve this issue?
a. Generate a new public and private key.
b. Disable email encryption.
c. Send your private key to the accountants.
d. Have the accounting company send their private key to you.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

You might be interested in
Write a loop that sets new scores to old scores shifted once left, with element 0 copied to the end. ex: if old scores = {10, 20
Inga [223]

#include <iostream>
using namespace std;

int main() {
   const int SCORES_SIZE = 4;
   int oldScores[SCORES_SIZE];
   int newScores[SCORES_SIZE];
   int i = 0;

   oldScores[0] = 10;
   oldScores[1] = 20;
   oldScores[2] = 30;
   oldScores[3] = 40;

   /* Your solution goes here */

   for (i = 0; i < SCORES_SIZE; ++i) {
      cout << newScores[i] <<" ";
   }
   cout << endl;

   return 0;
}

3 0
3 years ago
Read 2 more answers
Amy wants to controls the overall process of creating digital designs. Which career is Amy pursuing?
Hoochie [10]
Game designer

I hope this helped
8 0
3 years ago
________ is used to undo unwanted database changes.
riadik2000 [5.3K]
Backward Recovery would be the answer.

(:
5 0
3 years ago
Read 2 more answers
In order to customize the status bar, you must
Marianna [84]

The answer is:

D) Click on the icon with the horizontal bars.

8 0
3 years ago
Read 2 more answers
Match the following internet related terms to their definition
Luba_88 [7]

Answer:

1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email

Explanation:

8 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
    13·2 answers
  • Adult learners understand a topic best by doing it. It gives them both new skills and confidence in their ability to carryout th
    6·1 answer
  • Given a string, convert the characters of the string into opposite case,i.e. if a character is lower case than convert it into u
    12·1 answer
  • Technician A says that S-cams can be left or right handed. Technician B says that S-cam foundation brakes can have one or two an
    15·1 answer
  • If an engine has four cylinders and a total of 16 valves, how many valves would each cylinder have? A. Two B. One C. Four D. Thr
    12·1 answer
  • Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
    9·1 answer
  • If you receive an email message you suspect is spam, what should you do?
    11·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!