ExamGecko
Question list
Search
Search

Related questions











Question 247 - 312-50v12 discussion

Report
Export

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

A.
Bryan's public key; Bryan's public key
Answers
A.
Bryan's public key; Bryan's public key
B.
Alice's public key; Alice's public key
Answers
B.
Alice's public key; Alice's public key
C.
Bryan's private key; Alice's public key
Answers
C.
Bryan's private key; Alice's public key
D.
Bryan's public key; Alice's public key
Answers
D.
Bryan's public key; Alice's public key
Suggested answer: D

Explanation:

PKI uses public-key cryptography, which is widely used on the Internet to encrypt messages or authenticate message senders. In public-key cryptography, a CA generates public and private keys with the same algorithm simultaneously. The private key is held only by the subject (user, company, or system) mentioned in the certificate, while the public key is made publicly available in a directory that all parties can access. The subject keeps the private key secret and uses it to decrypt the text encrypted by someone else using the corresponding public key (available in a public directory). Thus, others encrypt messages for the user with the user's public key, and the user decrypts it with his/her private key.

asked 18/09/2024
Albert Smith
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first