The organization desires to ensure integrity, authenticity, and nonrepudiation of emails for sensitive communications between security administration and network administration personnel through the use of digitally signed emails. Which of the following is a valid step in signing an email with keys from a digital certificate?
A. The sender encrypts the email using the sender's public key.
B. The sender creates a message digest of the email and attachments using the sender's private key.
C. The sender creates a message digest of the email and attachments using a common hashing algorithm, such as DSA.
D. The sender encrypts the message digest using the sender's public key.
Answer: C. The sender creates a message digest of the email and attachments using a common hashing algorithm, such as DSA.
You might also like to view...
Direct selling involves _____
a. personal contact with consumers in their homes and a consumer's ordering via mail, phone, fax, or computer b. nonpersonal media and a consumer's ordering via mail, phone, fax, or computer c. personal contact with consumers in their homes and phone solicitations initiated by a retailer d. nonpersonal media and phone solicitations initiated by a retailer
Companies like Ferrari are known as ________ because they carve out a market niche and compete by providing a product that customers can attain in no other way
A) cost leaders B) focusers C) visionaries D) market leaders