Card 89 / 125: Alice and Bob want to exchange highly confidential business emails. So they started experimenting with the asymmetric key algorithms. Each of them generated a public and private key pair, exchanged the public key by post, and they are now ready to correspond. Alice used her own private key to sign and send their first top secret email. What is true?
A)
Bob can can decrypt and verify that the message was really originated by Alice using his own private key.
B)
Bob can can decrypt and verify that the message was really originated by Alice using her private key.
C)
Bob can can decrypt and verify that the message was really originated by Alice using her public key.
D)
Anyone who can obtain Alice's public key would be able to decrypt and verify that the message was really originated by Alice
Answer:
C) Bob can can decrypt and verify that the message was really originated by Alice using her public key.
D) Anyone who can obtain Alice's public key would be able to decrypt and verify that the message was really originated by Alice
Previous Card | ← Previous Card Button |
Next Card | → Next Card Button |
Flip Card | Space-Bar |
|
Oracle Certified Java Enterprise Architect
Author:
JavaChamp TeamSenior Java Developer
QuizOver.com
Germany
Access: |