41. Question ID: HOCK IT 004 (Topic: C. Information Security Controls)
- This topic has 1 reply, 2 voices, and was last updated 1 year ago by Kevin Hock.
Can anyone help me understand “public and private key” in encryption? I found a Google example of the post office where the sender uses the receiver’s address (public) and the receiver opens the mail with a private box (private key), but I still get confused in some other scenarios.
Samantha wants to send a document to Mohammed using a digital signature so that Mohammed will know with near-certainty that the document really did come from Samantha. Which of the following scenarios would describe the process of sending the document with a digital signature?
A.Samantha encrypts the document with her private key and Mohammed decrypts the document with her public key.
B.Samantha encrypts the document with Mohammed’s public key and Mohammed decrypts the document with his private key.
C.Samantha encrypts the document with her public key and Mohammed decrypts the document with her private key.
D.Samantha encrypts the document with her public key and Mohammed decrypts the document with his private key.
Question 41 of 73
- You must be logged in to reply to this topic.