Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need
to use to verify that the email came from Joe and decrypt it? (Select TWO).

A.
The CA’s public key
B.
Ann’s public key
C.
Joe’s private key
D.
Ann’s private key
E.
The CA’s private key
F.
Joe’s public key
This is wrong. If Joe sends an encrypted email, he will encrypt it with Ann’s public key. He will sign it by hashing it and encrypting the hash with his private key. To prove his identity, he must send his certificate, which is a document signed by the CA. So, Ann needs three things: her private key, Joe’s public key, and the CA’s public key. Normally, she would have this stored somewhere on her system, but it’s still needed.
0
0