ExamGecko
Question list
Search
Search

Related questions











Question 460 - 312-50v12 discussion

Report
Export

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

A.
Alice's private key
Answers
A.
Alice's private key
B.
Alice's public key
Answers
B.
Alice's public key
C.
His own private key
Answers
C.
His own private key
D.
His own public key
Answers
D.
His own public key
Suggested answer: B
asked 18/09/2024
najim faryabi
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first