1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
15

In a scenario where Nancy and Matthew are using public key encryption, which keys will Nancy have the ability to see in her publ

ic keyring (--list-keys)?
Computers and Technology
1 answer:
hammer [34]3 years ago
4 0

Answer:

Private key

Explanation:

From the question, we understand that the encryption type is a public encryption.

For better analysis, I will create the following scenario.

Encryption keys are stored in an encrypted form in a PGP (i.e. Pretty Good Privacy). This PGP homes the public and the private keys.

However, for Nancy to access the public keyring, she needs the private keys.

If by chance she lost/forgot the private keys, she will not be able to decrypt any information she receives.

Hence, the solution to this question is: <em>private key</em>

You might be interested in
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
3 years ago
Read 2 more answers
____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
nikdorinn [45]

Answer:

c. NSTISSI No. 4011

Explanation:

NSTISSI is an acronym for National Security Telecommunications and Information Systems Security Institute.

It is one of the standards set by the Committee on National Security Systems (CNSS), an intergovernmental agency saddled with the responsibility of setting policies for the security of the IT (information technology) security systems of the United States of America.

NSTISSI No. 4011 presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.

Generally, all information technology institutions and telecommunications providers are required by law to obtain a NSTISSI-4011 certification or license because it is a standard for Information Systems Security (INFOSEC) professionals.

8 0
3 years ago
Which type of evidence should victims collect to help officials catch cyber bullies
iren [92.7K]

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

3 0
4 years ago
Read 2 more answers
Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
kvv77 [185]
The movie was way better, though the actors in tge musical did a good job. Shrek
8 0
3 years ago
Read 2 more answers
Help!!!
Butoxors [25]

Answer:

ummmm try the inequality protragathron theorum

Explanation:

ok

3 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the
    11·1 answer
  • A system will always require what power connector?
    8·1 answer
  • Which Google Analytics visualization compares report data to the website average?A. Pivot viewB. Comparison viewC. Performance v
    8·1 answer
  • <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="225547404f435156475062404e434c4947560c414d4f">[email&#1
    12·2 answers
  • function calculate () { var s = 2; var x = 2; var y = 3; if (x &gt; 4) { s=s+ 2; } else if ( y &gt; 4) { s=s+ 4; } else { s+=3;}
    11·1 answer
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • When people receive benefits just because they belong to a particular identity group, this is called
    14·1 answer
  • This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a
    8·1 answer
  • What are the most common processes and procedures handled by data warehousing specialists? select all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!