Explanation: Any false site will not be able to encrypt using the private key of the real site, so the customer would not be able to decrypt the message using the public key. Many customers have access to the same public key so the host cannot use this mechanism to ensure the authenticity of the customer. The customer cannot be assured of the confidentiality of messages from the host as many people have access to the public key and can decrypt the messages from the host. The host cannot be assured of the confidentiality of messages sent out, as many people have access to the public key and can decrypt them. Area: 4 312. The database administrator has recently informed you of the decision to disable certain normalization controls in the database management system (DBMS) software to provide users with increased query performance. This will MOST likely increase the risk of: A. loss of audit trails.B. redundancy of data.C. loss of data integrity. D. unauthorized access to data.
The correct answer is:Explanation:Normalization is the removal of redundant data elements from the database structure. Disabling features of normalization in relational databases will increase the likelihood of data redundancy. Audit trails are a feature of DBMS software that can be lost by not enabling them. These are not connected to normalization controls. The integrity of data is not affected directly by disabling normalization controls. Access to data is set through defining user rights and controlling access to information, and is not affected by normalization controls. B. redundancy of data. Area: 4 313. E-mail message authenticity and confidentiality is BEST achieved by signing the message using the: The correct answer is: A. sender's private key and encrypting the message using the receiver's public key. Explanation: By signing the message with the sender's private key, the receiver can verify its authenticity using the sender's public key. By encrypting the message with the receiver's public key, only the receiver can decrypt the message using his/her own private key. The receiver's private key is confidential, and therefore unknown to the sender. Messages encrypted using the sender's private key can be read by anyone (with the sender's public key). Area: 4
- Summer '17