Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity's of Joe's certificate?

A. The CA's public key
B. Joe's private key
C. Ann's public key
D. The CA's private key
E. Joe's public key
F. Ann's private key


Ans:
A. The CA's public key
E. Joe's public key

Computer Science & Information Technology

You might also like to view...

Draw a binary search tree that results from inserting the following elements: 12, 16, 9, 1, 15, 13

What will be an ideal response?

Computer Science & Information Technology

A sans serif font contains thin lines on its characters

Indicate whether the statement is true or false

Computer Science & Information Technology

The default Administrator account is the account most sought by hackers

Indicate whether the statement is true or false.

Computer Science & Information Technology

Case-Based Critical Thinking Questions ? Case 7-1 Ted knows that macros can be helpful to him in his work with Excel spreadsheets, but he also knows they have their hazards, so he comes to you for guidance about what kind of security settings he should put in place, and at what times. ? ? While just getting his feet wet with Excel, you suggest to Ted that he might want to begin without having his installation of Excel have any macros run at all. Which of the following options would he select in the Trust Center?

A. Disable all macros without notification B. Cancel all macros C. Disable a macro with notification D. Disable all macros except digitally signed macros

Computer Science & Information Technology