Ask Question
2 May, 17:31

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

+1
Answers (1)
  1. 2 May, 19:18
    0
    Answer:Encryption is the process

    of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

    Types of encryption

    1. Symmetric encryption : This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

    2. Asymmetric encryption : This is foundational technology for SSL (TLS)

    How encryption is being configured

    Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers