Ann wants to send a file to Peter using PKI. Which of the following should Ann use in order to sign the file?
A. Peter’s public key
B. Peter’s private key
C. Ann’s public key
D. Ann’s private key
CompTIA exam questions
Ann wants to send a file to Peter using PKI. Which of the following should Ann use in order to sign the file?
A. Peter’s public key
B. Peter’s private key
C. Ann’s public key
D. Ann’s private key
Which of the following BEST describes part of the PKI process?
A. User1 decrypts data with User2’s private key
B. User1 hashes data with User2’s public key
C. User1 hashes data with User2’s private key
D. User1 encrypts data with User2’s public key
Company A sends a PGP encrypted file to company B. If company A used company B’s public key to encrypt the file, which of the following should be used to decrypt data at company B?
A. Registration
B. Public key
C. CRLs
D. Private key
Protecting the confidentiality of a message is accomplished by encrypting the message with which of the following?
A. Sender’s private key
B. Recipient’s public key
C. Sender’s public key
D. Recipient’s private key
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests.
Which of the following describes how this private key should be stored so that it is protected from theft?
A. Implement full disk encryption
B. Store on encrypted removable media
C. Utilize a hardware security module
D. Store on web proxy file system
Which of the following is true about PKI? (Select TWO).
A. When encrypting a message with the public key, only the public key can decrypt it.
B. When encrypting a message with the private key, only the private key can decrypt it.
C. When encrypting a message with the public key, only the CA can decrypt it.
D. When encrypting a message with the public key, only the private key can decrypt it.
E. When encrypting a message with the private key, only the public key can decrypt it.
Which of the following is true about an email that was signed by User A and sent to User B?
A. User A signed with User B’s private key and User B verified with their own public key.
B. User A signed with their own private key and User B verified with User A’s public key.
C. User A signed with User B’s public key and User B verified with their own private key.
D. User A signed with their own public key and User B verified with User A’s private key.
Peter must send Ann a message and provide Ann with assurance that he was the actual sender. Which of the following will Peter need to use to BEST accomplish the objective?
A. A pre-shared private key
B. His private key
C. Ann’s public key
D. His public key