Effective CISSP Questions

Alice wants to send a contract with a digital signature that enforces nonrepudiation to Bob. Which of the following best describes the process of generating the digital signature? (Wentz QOTD)
A. Generate a message authentication code of the contract using SHA
B. Generate the contract digest encrypted by Bob's public key
C. Encrypt the hash value of the contract using Alice's private key
D. Produce a ciphertext of the contract digest using a secret key agreed by Diffie-Hellman

Continue reading "CISSP PRACTICE QUESTIONS – 20210917"

Wentz Wu | September 17, 2021 at 1:23 pm | Categories: QOTD, Technology, 每日一題 | URL: https://wp.me/p2X0VJ-8FZ
Comment