Explanation Any false site will not be able to encrypt using the private key of

Explanation any false site will not be able to

This preview shows page 145 - 147 out of 325 pages.

Explanation: Any false site will not be able to encrypt using the private key of the real site, so the customer would not be able to decrypt the message using the public key. Many customers have access to the same public key so the host cannot use this mechanism to ensure the authenticity of the customer. The customer cannot be assured of the confidentiality of messages from the host as many people have access to the public key and can decrypt the messages from the host. The host cannot be assured of the confidentiality of messages sent out, as many people have access to the public key and can decrypt them. Area: 4 312. The database administrator has recently informed you of the decision to disable certain normalization controls in the database management system (DBMS) software to provide users with increased query performance. This will MOST likely increase the risk of: A. loss of audit trails.B. redundancy of data.C. loss of data integrity. D. unauthorized access to data.
Image of page 145
The correct answer is:Explanation:Normalization is the removal of redundant data elements from the database structure. Disabling features of normalization in relational databases will increase the likelihood of data redundancy. Audit trails are a feature of DBMS software that can be lost by not enabling them. These are not connected to normalization controls. The integrity of data is not affected directly by disabling normalization controls. Access to data is set through defining user rights and controlling access to information, and is not affected by normalization controls. B. redundancy of data. Area: 4 313. E-mail message authenticity and confidentiality is BEST achieved by signing the message using the: The correct answer is: A. sender's private key and encrypting the message using the receiver's public key. Explanation: By signing the message with the sender's private key, the receiver can verify its authenticity using the sender's public key. By encrypting the message with the receiver's public key, only the receiver can decrypt the message using his/her own private key. The receiver's private key is confidential, and therefore unknown to the sender. Messages encrypted using the sender's private key can be read by anyone (with the sender's public key). Area: 4
Image of page 146
Image of page 147

You've reached the end of your free preview.

Want to read all 325 pages?

  • Summer '17

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes