Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
Home
Secure Programming Practices
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and...
0
votes
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
1. Private, Public
2. local, Global
3. Public, Public
4. Public, Private
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
Public, Private
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Asymmetric Key Encryption/Decryption requires?
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: Symmetric Key Encryption/Decryption requires
asked
Mar 17, 2021
in
Secure Code Review
by
DavidAnderson
ssa
0
votes
Q: What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle attack? what is countermeasure to avoid this scenario?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
Q: Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
Q: Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
...