CompTIA Exam Questions

Which of the following can an employee use to validate the authenticity if the email?

An administrator receives a security alert that appears to be from one of the company’s vendors. The
email contains information and instructions for patching a serious flaw that has not been publicly
announced. Which of the following can an employee use to validate the authenticity if the email?

A.
Hashing algorithm

B.
Ephemeral Key

C.
SSL certificate chain

D.
Private key

E.
Digital signature