Suppose an intruder obtains a copy of a merchant’s certificate.
a. Explain why the intruder cannot simply use that certificate and pretend he is the merchant.
b. Explain why the intruder cannot replace the merchant’s public key with his own in the certificate.
What will be an ideal response?
a. Because the certificate contains the merchant’s public key. Since the intruder does now know the merchant’s private key, it cannot decrypt any message sent to the merchant.
b. Because the intruder cannot sign this fake certificate using the CA’s private key.
You might also like to view...
What would be the output of the following lines of code?
string word = “somebody”; cout << word.at(3); a) m b) e c) r d) d
Match the following standards with their use:
I. H.261 II. H.264/MPEG-4 III. H.320 IV. H.323 V. H.324 A. used with traditional telephone systems and mobile devices B. used with standard PSTNs, digital networks, T1, and satellite networks C. early video compression codec standard D. most recent video compression codec standard E. used with LANs
One of the main characteristics of worms is that they do not need a host program to function.
a. true b. false
Which of the following technologies would be used by a hotel for guest acceptance of an acceptable use policy?
a. Site survey b. Captive portal c. VPN over wireless d. MAC filtering