Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Can the computer which has been used for encryption be
traced?

Answers were Sorted based on User's Feedback



Can the computer which has been used for encryption be traced? ..

Answer / priya

R u sure Sreenath?

Is This Answer Correct ?    5 Yes 1 No

Can the computer which has been used for encryption be traced? ..

Answer / vc

The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.

Is This Answer Correct ?    4 Yes 0 No

Can the computer which has been used for encryption be traced? ..

Answer / ankit

it could be traces by the public key of the computer...which
is used to decrypt

Is This Answer Correct ?    0 Yes 1 No

Can the computer which has been used for encryption be traced? ..

Answer / sreenath

No, nothing is saved that permits tracing.

Is This Answer Correct ?    2 Yes 6 No

Post New Answer

More Encryption Decryption Interview Questions

What is cryptographic synchronisation?

0 Answers  


What is secret-key cryptography ?

0 Answers  


What is the Popular Symmetric-Key Encryption Method

0 Answers   HCL,


What is the life cycle of a key ?

1 Answers  


What is luc?

0 Answers  


What are the ecb and cbc modes?

0 Answers  


Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.

1 Answers  


How to change the location of the Kryptel (Silver Key) program group?

0 Answers  


What are the disadvantages of public-key cryptography compared with secret-key cryptography?

0 Answers  


What is public-key cryptography ?

0 Answers   TCS,


What are knapsack cryptosystems?

0 Answers  


What is probabilistic encryption?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)