Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature. A. Bryan's public key; Bryan's public key B. Alice's public key; Alice's public key C. Bryan's private key; Alice's public key D. Bryan's public key; Alice's public key  Suggested Answer: D Community Answer: D This question is in 312-50V11 EC-Council Certified Ethical Hacker v11 Exam For getting EC-Council Certified Ethical Hacker (CEH) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer