Ask Question

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

+3
Answers (1)
  1. 3 February, 08:16
    0
    Answer:Encryption is the process

    of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

    Types of encryption

    1. Symmetric encryption : This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

    2. Asymmetric encryption : This is foundational technology for SSL (TLS)

    How encryption is being configured

    Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers