1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
15

In a scenario where Nancy and Matthew are using public key encryption, which keys will Nancy have the ability to see in her publ

ic keyring (--list-keys)?
Computers and Technology
1 answer:
hammer [34]3 years ago
4 0

Answer:

Private key

Explanation:

From the question, we understand that the encryption type is a public encryption.

For better analysis, I will create the following scenario.

Encryption keys are stored in an encrypted form in a PGP (i.e. Pretty Good Privacy). This PGP homes the public and the private keys.

However, for Nancy to access the public keyring, she needs the private keys.

If by chance she lost/forgot the private keys, she will not be able to decrypt any information she receives.

Hence, the solution to this question is: <em>private key</em>

You might be interested in
When choosing a new computer to buy, you need to be aware of what operating it uses.
Pavlova-9 [17]

Answer: Size & Form-Factor, Screen Quality,Keyboard quality,CPU, RAM, Storage,Battery Life, USB 3.0, Biometric Security,Build quality.

Explanation:

1 - 7 are the most important for laptops and for desktops 1,3,4,5and 6.

Hope this helped!

8 0
3 years ago
Use the drop-down menus to complete each sentence.
gizmo_the_mogwai [7]

Answer:1 3 and 5 is Columns and 2 4 and 6 is Rows theres your answer.

Explanation: its self explanatory.

3 0
2 years ago
Read 2 more answers
Evaluate and compare free and commercial versions of the Avast antivirus software
Ivan

Answer:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

8 0
2 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
3 years ago
Advantages of a computer​
Bess [88]

Answer:

It eases work.

It is deligent.

It is versatile.

8 0
3 years ago
Other questions:
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2
    15·1 answer
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • How to write a function that counts the letters in a string in C?
    13·1 answer
  • To create a chart, you need to select at least
    8·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • 1. Pasar los siguientes ejercicios a diagrama de bloque
    11·1 answer
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • What are some other possible causes of an overheating laptop
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!