1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
15

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi

tting private data?
a. Certifying the data with a Creative Commons license before sending it
b. Sending the data using a high-bandwidth connection
c. Sending the data using public-key encryption
d. Sending the data using a corporate email server
Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
6 0

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

Vilka [71]3 years ago
5 0
The correct answer would be A
You might be interested in
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
Which website domains are most credible?
Leokris [45]

Credible websites usually end in the domain name .org or .edu

3 0
3 years ago
Read 2 more answers
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
You step out of your office and miss a telephone call. when you sit at your desk you notice that the voicemail light is blinking
Sauron [17]
The answer is <span>Unified Communications.  </span><span>You step out of your office and miss a telephone call. when you sit at your desk you notice that the voicemail light is blinking on your phone, you have a new email, and you have a transcribed instant message on your computer screen in the form of an instant message. your organization has most likely adopted Unified Communications type of technology.  </span>
6 0
3 years ago
WILL GIVE BRAINLIEST!!!!!
egoroff_w [7]
Third law :) Hope this helped you
5 0
3 years ago
Read 2 more answers
Other questions:
  • Let PALINDROME_DFA= | M is a DFA, and for all s ∈ L(M), s is a palindrome}. Show that PALINDROME_DFA ∈ P by providing an algorit
    5·1 answer
  • Once you select select a crop boundary, you can no
    15·1 answer
  • When were anonymous inner classes added to java?
    10·1 answer
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    11·1 answer
  • What is an internal node?
    11·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
    9·1 answer
  • What are the different alignment options available in Microsoft​
    11·2 answers
  • What is the meaning of url <br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!