Multiple Choice
If Bob receives an encrypted reply message from Alice,whose private key is used to decrypt the received message?
A) Bob's private key.
B) Alice's private key.
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q20: Encryption is the practice of transforming information
Q21: Which of the following are considered to
Q22: What four basic protections can cryptography support?
Q23: Wireless data networks are particularly susceptible to
Q24: What alternative term can be used to
Q26: What term describes data actions being performed
Q27: What is a pseudorandom number generator?
Q28: Asymmetric cryptographic algorithms are also known as
Q29: Explain how a hash algorithm works and
Q30: Data that is in an unencrypted form