Multiple Choice
Choose the LEAST accurate statement of the public key encryption.
A) When A sends a message to B, A encrypts it with B's public key.
B) After A encrypts a message with B's public key, A can decrypt it using the same B's public key.
C) When A needs authentication to B, A encrypts a message with A's private key.
D) If A and B send messages to each other, each encrypts with the other's public key.
E) If A encrypts a message with B's public key, B's private key will decrypt it.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: How to combine asymmetric and symmetric key
Q2: Choose an INCORRECT statement about the digital
Q4: The IPsec technology can be deployed in
Q5: Which is CORRECT about hashing?<br>A) Hashing takes
Q6: The main components of a cryptography system
Q7: The hash function is used to derive
Q8: The cipher text is _.<br>A) a message
Q9: In total, how many different keys should
Q10: Choose a CORRECT statement regarding SSL.<br>A) The
Q11: When IPv6 is in full swing, _