CISSP Practice Question – Cryptography
An organization wants to implement digital signatures to ensure integrity and non-repudiation of sensitive documents exchanged between business partners.
Which of the following BEST describes how a digital signature is created?
A. The sender encrypts the message with their private key, and the recipient decrypts it with the sender’s public key.
B. The sender hashes the message and encrypts the hash with their private key; the recipient verifies it with the sender’s public key.
C. The sender encrypts the message with the recipient’s public key, and the recipient decrypts it with their private key.
D. The sender hashes the message and encrypts the hash with the recipient’s public key; the recipient decrypts it with their private key.
3
13 comments
Vincent Primiani
7
CISSP Practice Question – Cryptography
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by