Problem
1. When you change your local directory from inside ftp, will the changed directory still be in place after you quit ftp, and why or why not?
2. When A sends data to B over a network connection using public key cryptography, how does A achieve the goals of
(i) authentication,
(ii) confidentiality?
3. Public key cryptography is more suitable for key distribution than bulk data encryption. Explain how you can use this mechanism to distribute a symmetric key.