Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity's of Joe's certificate?
A. The CA's public key
B. Joe's private key
C. Ann's public key
D. The CA's private key
E. Joe's public key
F. Ann's private key
Ans:
A. The CA's public key
E. Joe's public key
You might also like to view...
Draw a binary search tree that results from inserting the following elements: 12, 16, 9, 1, 15, 13
What will be an ideal response?
A sans serif font contains thin lines on its characters
Indicate whether the statement is true or false
The default Administrator account is the account most sought by hackers
Indicate whether the statement is true or false.
Case-Based Critical Thinking Questions ? Case 7-1 Ted knows that macros can be helpful to him in his work with Excel spreadsheets, but he also knows they have their hazards, so he comes to you for guidance about what kind of security settings he should put in place, and at what times. ? ? While just getting his feet wet with Excel, you suggest to Ted that he might want to begin without having his installation of Excel have any macros run at all. Which of the following options would he select in the Trust Center?
A. Disable all macros without notification B. Cancel all macros C. Disable a macro with notification D. Disable all macros except digitally signed macros