Live Virtual Machine Lab 4-1: Cryptographic Solutions

Ace your homework & exams now with Quizwiz!

Which files does Alice send to Bob so her digital signature can be verified? [Choose all that apply]

Alice's Prublic Key Alice's Signature File Alice's Digest

What process is completed after a Certificate Authority (CA) receives a Certificate Signing Request (CSR) and before they sign the requestor's certificate?

Domain Validation

Asymmetric encryption requires two keys that are mathematically related. How is this mathematical relationship established?

The public key takes the private key as input during key generation

By default, what format are OpenSSL certificates created in?

PEM

Which cryptographic algorithm is asymmetric?

RSA


Related study sets

Vocabulary Economics Principles Practices

View Set

Fundamentals of Information Security CH8

View Set

Financial Management Chapter 1, Financial Management Chapter 2, Financial Management Chapter 3, Financial Management Chapter 4

View Set

Physics Chapter 17: Electrical Energy and Current

View Set