The FIRST step in a successful attack to a system would be:
The sender of a public key would be authenticated by a:
Which of the following would protect the confidentiality of the data?
The MOST significant risk of this approach is:
Which of the following is MOST important?