1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
11

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.

Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
Which of the following steps will you take to resolve this issue?
a. Generate a new public and private key.
b. Disable email encryption.
c. Send your private key to the accountants.
d. Have the accounting company send their private key to you.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

You might be interested in
When the computer begins to run a program
Ne4ueva [31]

Answer:

1.the program is moved from secondary storage to memory.

Explanation:

Secondary storage media generally have greater storage capacity than RAM (random access memory), for this reason the data and program are stored there.

but ram memories are much faster, for example, a solid state disk (SSD) with SATA III connection can have read and write speeds of approximately 500 MB/s, while a DDR III RAM can have speeds between 12 and 18 GB/S, that is, more than 20 times faster.

 So that the flow of data at the time of running a program is optimal, the data from the secondary storage unit is copied to the RAM and this ensures that the speed at which the programs run is at least 20 times faster, and our processes run better.

7 0
3 years ago
Which description of the plain text file format is most accurate?
dsp73
1. uses binary code to store data!
4 0
3 years ago
Read 2 more answers
I need help <br> Match each words with its definition!!!<br> Please helpppppppp
satela [25.4K]

Answer:

Top to bottom Answer in order

#1 hardskills

#2 goal

#3 value

#4 soft skills

#5 on the job training

#6 self training

6 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
AlexFokin [52]

Answer:

ECC memory

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the best type of RAM for this situation would be ECC memory (RAM). This abbreviation refers to Error-Correcting-Code, this memory can detect and correct many common types of errors, and is used mainly for servers or when sensitive data is involved where errors and data corruption cannot be allowed to happen under any circumstance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
OverLord2011 [107]

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

3 0
3 years ago
Other questions:
  • 7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
    6·1 answer
  • HELP NOW PLZZ/ Question: Complete the sentence with the correct response.
    11·1 answer
  • Why is binary code made up of a series of ones and zeros?
    15·1 answer
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • How do you close a document but keep the word processing program open?
    11·2 answers
  • Which of the following is the path to the zoom button? select one:
    5·2 answers
  • Jill edited James's document using Track Changes. James agrees with all of the edits and wants to incorporate them into his text
    9·2 answers
  • Which of the following is a non timber forest product
    7·1 answer
  • Match the job roles with their appropriate qualifications. business analyst multimedia artist network and computer systems admin
    9·2 answers
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!