Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 193 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 193
Topic #: 1
[All 312-50v11 Questions]

Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.

  • A. Bryan's public key; Bryan's public key
  • B. Alice's public key; Alice's public key
  • C. Bryan's private key; Alice's public key
  • D. Bryan's public key; Alice's public key
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Mdean
Highly Voted 3 years ago
Correct Answer should be D. Alice should Use Bryan's public key so only Brian can decrypt it with his private key. Bryan will use Alice's public key to confirm this msg came from Alice as she is the only one with the private key.
upvoted 47 times
cerzocuspi
3 years ago
Correct
upvoted 3 times
...
...
sumitgavhankar
Highly Voted 2 years, 4 months ago
Selected Answer: D
Alice: Signs msg with own private key & uses Bryan's public key is used for encryption Bryan: decrypts with own private key & uses Alice's public key to verify the signed msg.
upvoted 14 times
...
Spake
Most Recent 1 year, 5 months ago
Selected Answer: D
pki use public key encrypt message,digital signature use private key singi,public key confirm.
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: D
Digital Signature Digital signature uses asymmetric cryptography to simulate the security properties of a signature in digital rather than written form.The two types of keys in public-key cryptography are the private key (only the signer knows this key and uses it to create a digital signature) and the public key (it is widely known and the relying party uses it to verify the digital signature). (P.3080/3064)
upvoted 2 times
...
CHANh1990mar
1 year, 10 months ago
D for sure
upvoted 1 times
...
pawel_ceh
2 years, 1 month ago
Selected Answer: D
Just another ... error.
upvoted 2 times
...
TheDark
2 years, 3 months ago
D is correct answer
upvoted 1 times
...
egz21
2 years, 3 months ago
Answer D is correct but betwen share the public Key in this case!!
upvoted 1 times
...
RoVasq3
2 years, 3 months ago
Option D is the correct
upvoted 1 times
...
Prem1um
2 years, 4 months ago
Selected Answer: D
should be D
upvoted 1 times
...
Tomu20
2 years, 4 months ago
Selected Answer: D
D For me.
upvoted 1 times
...
frdzcn
2 years, 4 months ago
Selected Answer: D
D is correct answer
upvoted 1 times
...
Novmejst
2 years, 4 months ago
This one is tricky :-) D. Bryan's public key; Alice's public key
upvoted 3 times
...
Mahmoudtaha
2 years, 4 months ago
Selected Answer: D
Correct answer is D
upvoted 3 times
...
XxCharliexX
2 years, 4 months ago
D is correct
upvoted 2 times
...
Damith_a
2 years, 4 months ago
Selected Answer: D
Answer is D
upvoted 2 times
...
LIBUNB
2 years, 5 months ago
Selected Answer: D
Option D is the correct answer Bryan's public key; Alice's public key
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...