[Solved]Bob Trying Send Encrypted Message Alice Using Asymmetric Key Approach Key Bob Use Encrypt Q37038538
Bob is trying to send an encrypted message to Alice using theAsymmetric Key approach. Which key will Bob use to encrypt themessage for Alice?
Alice’s Private Key
Bob’s Public Key
Alice’s Public Key
Bob’s Private Key
Flag this Question
Question 210 pts
Alice wants to digitally sign a message so that Bob can beassured that the message came from Alice and has not been changedin transit. Which key must Alice use to encrypt the messagedigest?
Bob’s Public Key
Bob’s Private Key
Alice’s Private Key
Alice’s Public Key
Flag this Question
Question 310 pts
Bob received a digitally signed message from Alice (i.e. messagewas signed by Alice). Which key should Bob use to decrypt themessage digest (hash) in order to verify that the message indeedcame from Alice?
Bob’s Private Key
Alice’s Private Key
Bob’s Public Key
Alice’s Public Key
Flag this Question
Question 410 pts
Alice and Bob wish to securely communicate using the public key(asymmetric key) system. What’s the minimum number of keys theywould need added together (i.e. total number of keys needed forAlice and Bob combined)?
2
1
3
4
Flag this Question
Question 510 pts
There are 5 participants in a Symmetric Key system and they allwish to communicate with each other in a secure fashion usingSymmetric Keys. What’s the minimum number of Symmetric Keys neededfor this scenario?
5
10
20
1
Flag this Question
Question 610 pts
A fundamental problem/security concern with Public Key(Asymmetric Key) based systems is verifying the association betweenan entity and that entity’s Public Key. This problem is addressedby:
Digital Certificates
Signature Verification
Nonrepudiation
Zero-knowledge proof
Flag this Question
Question 710 pts
Alice and Bob met in person and shared a secret cryptographickey. They will use the same key both for encryption and fordecryption. Which type of cryptographic system are they using?
Symmetric Key Cryptography
Asymmetric Key Cryptography
Cryptographic Hash Functions
Public Key Cryptography
Flag this Question
Question 810 pts
Bob sends an encrypted message to Alice using the Asymmetric Keyapproach. Which key will Alice use to decrypt the message fromBob?
Alice’s Public Key
Bob’s Private Key
Bob’s Public Key
Alice’s Private Key
Flag this Question
Question 910 pts
Choose the best answer: Cryptographic techniques (e.g.,encryption, hashing) help with the following information securityobjective(s):
Confidentiality
Integrity
Authentication and Non-Repudiation
All of the above
Flag this Question
Question 1010 pts
Choose the best answer: In information security, Cryptography(when used properly) can help protect:
Data at rest (over time)
Data in transit (over distance)
Both data at rest and data in transit
None of the above
Expert Answer
Answer to Bob is trying to send an encrypted message to Alice using the Asymmetric Key approach. Which key will Bob use to encrypt… . . .
OR

