PrepAway - Latest Free Exam Questions & Answers

which of the following?

Public keys are used for which of the following?

PrepAway - Latest Free Exam Questions & Answers

A.
Decrypting wireless messages

B.
Decrypting the hash of an electronic signature

C.
Bulk encryption of IP based email traffic

D.
Encrypting web browser traffic

Explanation:
The sender uses the private key to create a digital signature. The message is, in effect, signed with the
private key. The sender then sends the message to the receiver. The receiver uses the public key attached
to the message to validate the digital signature. If the values match, the receiver knows the message is
authentic.
Incorrect Answers:
A: Wireless traffic is not decrypted by public keys.
C: Public keys are not used to encrypt email traffic.
D: Public keys are not used to encrypt web browser traffic.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 279-285


Leave a Reply