Multiple Choice
Using a combination of symmetric and asymmetric key encryption,Chris Kai sent a report to her home office in Syracuse,New York.She received an email acknowledgement that the document had been received and then,a few minutes later,she received a second email that indicated that the hash calculated from the report differed from that sent with the report.This most likely explanation for this result is that
A) the public key had been compromised.
B) the private key had been compromised.
C) the symmetric encryption key had been compromised.
D) the asymmetric encryption key had been compromised.
Correct Answer:

Verified
Correct Answer:
Verified
Q8: Describe symmetric encryption and identify three limitations.
Q9: Which of the following describes one weakness
Q11: These are used to create digital signatures.<br>A)
Q12: Concerning virtual private networks (VPN),which of the
Q15: Describe some steps you can take to
Q17: Which of the following is not one
Q26: Which of the following descriptions is not
Q30: Encryption has a remarkably long and varied
Q37: In developing policies related to personal information
Q55: An electronic document that certifies the identity