nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #372

CERTIFIED-IN-CYBERSECURITY Question #372: Real Exam Question with Answer & Explanation

The correct answer is C: Alice's private key. Note: Secure messaging typically involves using public and private keys. To determine which key is used by Alice to decrypt the encrypted message received from Bob, we need to think step by step: The public key is used for encryption, while the private key is used for decryption.

Security Principles

Question

Alice and Bob are good friends and want to exchange messages securely. Alice receives a message from Bob. What key does Alice use to decrypt the encrypted message she received?

Options

  • AAlice's public key
  • BBob's private key
  • CAlice's private key
  • DBob's public key

Explanation

Note: Secure messaging typically involves using public and private keys. To determine which key is used by Alice to decrypt the encrypted message received from Bob, we need to think step by step: The public key is used for encryption, while the private key is used for decryption. If Bob encrypts the message, he can use his private key or Alice's public key for encryption. However, keep in mind that Alice is the intended recipient. Since Alice is the recipient and needs to decrypt the message, she would use her own private key for decryption. Therefore, Alice's private key is the key used by Alice to decrypt the encrypted message received from Bob. Based on the above reasoning, the key needed to be used is Alices' private key (see ISC2 Study Guide, Module 1, under Encryption Overview).

Topics

#Asymmetric Encryption#Public Key Cryptography#Key Management#Confidentiality

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions