COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What must a user need to decrypt a file?
A
Coin
B
Key
C
Token
D
Graph
Explanation: 

Detailed explanation-1: -Data encrypted with one key are decrypted only with the other key in the public/private key pair. When an asymmetric key pair is generated, the public key is typically used to encrypt, and the private key is typically used to decrypt.

Detailed explanation-2: -For secret-key encryption, you must know both the key and IV that were used to encrypt the data. For public-key encryption, you must know either the public key (if the data was encrypted using the private key) or the private key (if the data was encrypted using the public key).

Detailed explanation-3: -From the Start menu, select Programs or All Programs, then Accessories, and then Windows Explorer. Right-click the file or folder you want to decrypt, and then click Properties. On the General tab, click Advanced. Clear the Encrypt contents to secure data checkbox, and then click OK. 18-Jan-2018

There is 1 question to complete.