1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
11

A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.

Today you received a call from one of your users stating they are unable to decrypt any of the emails sent by the accountants.
Which of the following steps will you take to resolve this issue?
a. Generate a new public and private key.
b. Disable email encryption.
c. Send your private key to the accountants.
d. Have the accounting company send their private key to you.
Computers and Technology
1 answer:
ratelena [41]3 years ago
8 0

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

You might be interested in
Which of the following is true of the poka-yoke approach used for mistake-proofing processes?
Svetradugi [14.3K]

Answer:  b)It helps to engage workers in continuous improvement activities.

Explanation: Poke-yoke method was the technique to eliminate the mistakes that happen in a manufacturing process. It helps in avoiding the issues in the product and correcting those errors.

Mistake proofing is the mechanism of this methods that ensures about the product manufactured is safe from any failure and defects.It alerts the workers to improve the product through their working.

Other options are incorrect because it was developed by Shigeo Shingo , they had easy mechanism and feedback system did not told the workers about defects.Thus, the correct option is option(b).

7 0
3 years ago
Read 2 more answers
What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon
Paladinen [302]

Answer:

The correct answer to the following question will be "The capacity to work without reference to the data that would be contained in each bundle".

Explanation:

  • The Layer network governs the activity of the subnet. The main objective of this layer would be to transport data over multiple links from source to destination. When two computers are linked to the same cable, see no need for the network layer.
  • The role of this layer protocols defines the configuration and handling of packets used to transfer information from one to another host.
  • The main purpose of this layer is to allow multiple channels to be intertwined. This is achieved by sending packets to network adapters that depend on algorithms to identify the best directions for the information to move. Such routes are referred to as computer circuits.

Therefore, it would be the right answer.

6 0
3 years ago
In C, a switch construct can have ________ number of default case(s). *
azamat

I think so that it will be zero or more

7 0
3 years ago
What is an internal node?
Phantasy [73]
An internal node is a node which carries at least one child or in other words, an internal node is not a leaf node.
8 0
3 years ago
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
Other questions:
  • What aspect do you need to keep in mind when you add images in a word document?
    11·2 answers
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • .Write a MATLAB script that VECTORIZES (eliminates the loop) the following code. (4points)
    14·1 answer
  • Please select the word from the list that best fits the definition
    13·2 answers
  • you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
    14·1 answer
  • Plzz help me with this question.........
    6·1 answer
  • Who invented the first mechanical computer? in what year was it invented?.
    11·1 answer
  • If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attem
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!