Multiple Choice
Alice sends an e-mail that she encrypts with a shared key,which only she and Bob have.Upon receipt Bob decrypts the email and reads it.This application of encryption is an example of
A) Confidentiality
B) Integrity
C) Authentication
D) Nonrepudiation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q28: A special mathematical function that performs one-way
Q29: What is steganography and what danger does
Q30: Cryptography can be used to protect confidentiality
Q31: Alice sends Bob a message along with
Q32: The encryption method base on the idea
Q34: _ is done by comparing the input
Q35: Agents intercept a message that is encrypted.They
Q36: What are some of the uses of
Q37: What is key management and why is
Q38: The encryption method based on the idea