1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
11

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.

Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
Which of the following steps will you take to resolve this issue?
a. Generate a new public and private key.
b. Disable email encryption.
c. Send your private key to the accountants.
d. Have the accounting company send their private key to you.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

You might be interested in
Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
Sphinxa [80]

Answer:

Open Source

Explanation:

When a developer makes something open to the public, free to edit and use how they want, they make the project open source.

4 0
3 years ago
Read 2 more answers
str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
Lena [83]

Answer:

It gives a new string

Explanation:

In programming; when two or more strings are concatenated by a concatenating operator, the result is always a new string.

From the question, we have that

str1 = "Good

str2 = "Evening"

Let's assume that + is the concatenating operator;

str1 + str2 = "Good" + "Evening" = "GoodEvening"

The result of concatenating str1 and str2 is a new string "GoodEvening" while str1 and str2 still maintain their original string value of "Good" and "Evening"

5 0
3 years ago
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
Mateo could not find the undo command or shortcut. He should _____.
mr Goodwill [35]
Mateo should click on help.
5 0
3 years ago
Read 2 more answers
If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
Elenna [48]

Answer:

5.

Explanation:

6 0
3 years ago
Other questions:
  • How do you know if a remote host is alive or not?
    5·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • ​For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbol
    10·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • An interface does not have ____.
    13·1 answer
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • What is the difference between private inheritance and composition?
    11·1 answer
  • An array, numbers, of integers is filled with 100 random numbers whose values are greater than 10 and less than 255. You DO NOT
    7·1 answer
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!