PrepAway - Latest Free Exam Questions & Answers

which of the following?

Public keys are used for which of the following?

PrepAway - Latest Free Exam Questions & Answers

A.
Decrypting wireless messages

B.
Decrypting the hash of an electronic signature

C.
Bulk encryption of IP based email traffic

D.
Encrypting web browser traffic

Explanation:
The sender uses the private key to create a digital signature. The message is, in effect, signed
with the private key. The sender then sends the message to the receiver. The receiver uses the
public key attached to the message to validate the digital signature. If the values match, the
receiver knows the message is authentic.


Leave a Reply