Menu

[Solved]Bob Trying Send Encrypted Message Alice Using Asymmetric Key Approach Key Bob Use Encrypt Q37038538

Bob is trying to send an encrypted message to Alice using theAsymmetric Key approach. Which key will Bob use to encrypt themessage for Alice?

Alice’s Private Key

Bob’s Public Key

Alice’s Public Key

Bob’s Private Key

Flag this Question

Question 210 pts

Alice wants to digitally sign a message so that Bob can beassured that the message came from Alice and has not been changedin transit. Which key must Alice use to encrypt the messagedigest?

Bob’s Public Key

Bob’s Private Key

Alice’s Private Key

Alice’s Public Key

Flag this Question

Question 310 pts

Bob received a digitally signed message from Alice (i.e. messagewas signed by Alice). Which key should Bob use to decrypt themessage digest (hash) in order to verify that the message indeedcame from Alice?

Bob’s Private Key

Alice’s Private Key

Bob’s Public Key

Alice’s Public Key

Flag this Question

Question 410 pts

Alice and Bob wish to securely communicate using the public key(asymmetric key) system. What’s the minimum number of keys theywould need added together (i.e. total number of keys needed forAlice and Bob combined)?

2

1

3

4

Flag this Question

Question 510 pts

There are 5 participants in a Symmetric Key system and they allwish to communicate with each other in a secure fashion usingSymmetric Keys. What’s the minimum number of Symmetric Keys neededfor this scenario?

5

10

20

1

Flag this Question

Question 610 pts

A fundamental problem/security concern with Public Key(Asymmetric Key) based systems is verifying the association betweenan entity and that entity’s Public Key. This problem is addressedby:

Digital Certificates

Signature Verification

Nonrepudiation

Zero-knowledge proof

Flag this Question

Question 710 pts

Alice and Bob met in person and shared a secret cryptographickey. They will use the same key both for encryption and fordecryption. Which type of cryptographic system are they using?

Symmetric Key Cryptography

Asymmetric Key Cryptography

Cryptographic Hash Functions

Public Key Cryptography

Flag this Question

Question 810 pts

Bob sends an encrypted message to Alice using the Asymmetric Keyapproach. Which key will Alice use to decrypt the message fromBob?

Alice’s Public Key

Bob’s Private Key

Bob’s Public Key

Alice’s Private Key

Flag this Question

Question 910 pts

Choose the best answer: Cryptographic techniques (e.g.,encryption, hashing) help with the following information securityobjective(s):

Confidentiality

Integrity

Authentication and Non-Repudiation

All of the above

Flag this Question

Question 1010 pts

Choose the best answer: In information security, Cryptography(when used properly) can help protect:

Data at rest (over time)

Data in transit (over distance)

Both data at rest and data in transit

None of the above

Expert Answer


Answer to Bob is trying to send an encrypted message to Alice using the Asymmetric Key approach. Which key will Bob use to encrypt… . . .

OR


Leave a Reply

Your email address will not be published. Required fields are marked *