Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.
A . Bryan’s public key; Bryan’s public key
B . Alice’s public key; Alice’s public key
C . Bryan’s private key; Alice’s public key
D . Bryan’s public key; Alice’s public key

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments