exam questions

Exam 210-260 All Questions

View all questions & answers for the 210-260 exam

Exam 210-260 topic 2 question 128 discussion

Actual exam question from Cisco's 210-260
Question #: 128
Topic #: 2
[All 210-260 Questions]

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

A.
The sender encrypts the message using the sender's public key, and the receiver decrypts the message using the sender's private key.
B.
The sender encrypts the message using the sender's private key, and the receiver decrypts the message using the sender's public key.
C.
The sender encrypts the message using the receiver's public key, and the receiver decrypts the message using the receiver's private key.
D.
The sender encrypts the message using the receiver's private key, and the receiver decrypts the message using the receiver's public key.
E.
The sender encrypts the message using the receiver's public key, and the receiver decrypts the message using the sender's public

Show Suggested Answer Hide Answer
Suggested Answer: B

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vpnwd669
5 years, 2 months ago
should be B
upvoted 1 times
...
jocarul
5 years, 2 months ago
You right: "verify" it may be option B is valid, as you say. If the question said "decrypt," then option C would be the correct one.
upvoted 1 times
...
jocarul
5 years, 2 months ago
Ref: https://en.wikipedia.org/wiki/Public-key_cryptography
upvoted 1 times
...
jocarul
5 years, 2 months ago
In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In this example the message is only digitally signed and not encrypted. 1) Alice signs a message with her private key. 2) Bob can verify that Alice sent the message and that the message has not been modified. So, i think option C is OK
upvoted 1 times
...
max80
5 years, 2 months ago
B is valid. authenication - sender use self prived key confidance - sender use public key of reciver
upvoted 1 times
...
jocarul
5 years, 2 months ago
Should be C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago