exam questions

Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

Exam 312-50 topic 5 question 26 discussion

Actual exam question from ECCouncil's 312-50
Question #: 26
Topic #: 5
[All 312-50 Questions]

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

  • A. Sender's public key
  • B. Receiver's private key
  • C. Receiver's public key
  • D. Sender's private key
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Novmejst
7 months, 1 week ago
Selected Answer: D
D. Sender's private key In a digital signature, the message digest (a fixed-length representation of the original message) is encrypted with the sender's private key. This process creates a unique digital signature that can only be decrypted by the sender's public key, which is widely available. When the receiver gets the message, they can verify its authenticity by using the sender's public key to decrypt the digital signature and comparing it to the message digest they calculated from the received message. If the two match, the receiver can be reasonably sure that the message came from the claimed sender and has not been altered in transit.
upvoted 3 times
...
salei
1 year ago
Selected Answer: D
To prove sender identity, they have to encrypt with its own private key. The receiver can prove that he's who's claim to be by properly decrypting the message with the sender public key
upvoted 1 times
...
Ka2021ka
2 years ago
Selected Answer: C
Encrypted by receiver’s public key
upvoted 2 times
dorinh
1 year, 12 months ago
Receiver’s public key is available also for an attacker, so he can change the message, generate another hash and encript the hash with the receiver’s public key so the authenticyty of the message is not garanteed. If the hash is encripted with the sender's private key, anyoane can decrypt it with the sender's pubic key to validate the hash. With this approach, the authenticity of the message is guaranteed, as log as the sender's privte key is not compriomised .
upvoted 3 times
...
WZ1122
1 year, 8 months ago
Encryption is using receiver's public key and decrypted by receiver's private key. digital signature is using sender's private key and verified by sender's public key.
upvoted 4 times
...
HeyacedoGomez
10 months, 1 week ago
I think the question stated signing......and that's done by hashing the data with sender's PRIVATE key.....
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...