A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
a. Recipient's private key
b. Sender's private key
c. Sender's public key
d. Recipient's public key
Answer: c. Sender's public key
Learn More :
Cryptography
- Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers)
- You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
- You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?
- Which of the following are asymmetric encryption algorithms? (Select the three best answers)
- Which of the following are symmetric encryption algorithms? (Select the four best answers)
- Which of the following is the weakest encryption type?
- A user sends an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to send the message?
- A user sends an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to receive the message?
- A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
- Which type of encryption technology is used with the bitlocker application?
- Which of the following technologies uses a PSK (Preshared Key)?
- Which of the following encryption methods deals with two distinct large prime numbers and the inability to factor those prime numbers?
- Which of following algorithms is used by the protocol TLS to establish a session key?
- How many bit keys are common in 3DES?
- How many bit keys are common in AES-256?
- How many bit keys are common in AES?
- How many bit keys are common in DES?
- How many bit keys are common in Asymmetric encryption?
- MD5 algorithm will have how many bits?
- SHA1 algorithm will have how many bits?
- SHA2 algorithm will have how many bits?
- Which Algorithm has Typical Key Size of 128/192/256-Bit?
- Which Algorithm has Typical Key Size of 256-Bit?
- Which Algorithm has Typical Key Size of 64-Bit?