What other ways could the orders be relayed to the commanders?
Choose one method, identify the problems… In person, over the phone, through eMail, by post, in an encrypted message
Why doesn’t this method guarantee that the orders are genuine?
We now know the orders are genuine, but what other problem have we created?
Explain how our soldiers could combine the two methods of using Public and Private keys to: Ensure the message from the General can’t be read by the enemy.
Explain how our soldiers could combine the two methods of using Public and Private keys to: Guarantee that the message has come from the General.
Please enter your name here.
Congratulations, you have completed the quiz!
Your Score:

Sorry, you failed to complete the quiz

Post 16 Master Class - Computer Science - Quiz
Start
Quality
HIGH
LOW
Playback Speed
0.25
0.5
0.75
1
1.25
1.5
2
Select Stream
1
2
Loop Playback
ON
OFF
Overlay Controls
YES
NO
Quality
It is recommended to view this quiz/timeline on a larger screen or viewing area.
If you are on a mobile device, it is advised to rotate the phone into landscape.
Click here to continue viewing the quiz.
00:00 / 00:00