Question

1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's...

1) to verify a digital CERTIFICATE, we need the ___
a) CA's private key
b) CA's public key
c) certificate owner's private key
d) certificate owner's public key

2) If the sender encrypts the message with the receiver's public key, it achieves the purpose of ___
a) confidentiality
b) authentication
c) confidentiality but not authentication
d) confidentiality and authentication

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. d) certificate owner's public key

We need the public key of certificate owner because only this will be able decrypt the certificate which is encrypted with private key of the owner.

2. c) confidentiality but not authentication

The public key is available to all, so anyone can encrypt the data therefore the message would not be authenticated because anyone can encrypt the message using that public key. But as the data is encrypted therefore it cannot be decrypted without private key therefore confidentiality is achieved.

Add a comment
Know the answer?
Add Answer to:
1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition...

    41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition D. Shift 42. Which encryption algorithm can have key sizes of 128, 192, and 256 bits, with the key size affecting the number of rounds used in the algorithm? A. SHA B. RC С. AES D. DES 43. Which of the following security principles ensures that the sender and the recipient of a message are informed that the message was not altered in transmission?...

  • 1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do...

    1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________ 2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________ 3. If the sender of a message encrypts the...

  • SEED Labs-PKI Lalb 2 Lab Tasks 2.1 Task 1: Becoming a Certificate Authority (CA) A Certificate Au...

    SEED Labs-PKI Lalb 2 Lab Tasks 2.1 Task 1: Becoming a Certificate Authority (CA) A Certificate Authority (CA) is a trusted entity that issues digital certificates. The digital certificate cert fes the ownership of a public key by the named subject of the certificate. A number of commercial CAs are treated as root CAs; VeriSign is the largest CA at the time of writing. Users wbo want to get digital certificates issued by the commercial CAs need to pay those...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • A digital certificate Multiple Choice a. indicates that the subscriber identified has sole control and access...

    A digital certificate Multiple Choice a. indicates that the subscriber identified has sole control and access to the private key. b. is used to certify public-key and private-key pairs. c. ensures that the symmetric-key encryption method functions well. d. is a trusted entity to certify and revoke Certificate Authorities (CA).

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Question 4 (5 points) Consider the following scenario: Alice wants to send Bill a message. Alice...

    Question 4 (5 points) Consider the following scenario: Alice wants to send Bill a message. Alice encrypts some information using Bill's public key; Bill decrypts the ciphertext using his private key. This is an example of: Question 4 options: 1) symmetric encryption 2) digital certificate 3) asymmetric encryption 4) digital signature

  • CS Data communication and Networkin EL PILUL UT IILPULUI 1 4-5. In digital certificate authentication, the...

    CS Data communication and Networkin EL PILUL UT IILPULUI 1 4-5. In digital certificate authentication, the suppli- cant could impersonate the true party by doing the calculation with the true party's private key. What prevents impostors from doing this?

  • Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob....

    Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob. In order to verify the signature, Alice does the following: Hashes the received message using the same hash algorithm that Bob used, that's your calculated hash Decrypts the signature using the public key contained in the certificate, that your decrypted hash Compares the calculated hash and the decrypted hash Because the 2 hashes are identical, Alice goes on and: Checks the validity period on...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT