Exam Permalink:
https://www.jobilize.com/sun-certified-enterprise-architect-scea
Question Permalink:
https://www.jobilize.com/asymmetric-key-algorithms
Question 86 / 121:  Alice and Bob want to exchange highly confidential business emails. So they started experimenting with the asymmetric key algorithms. Each of them generated a public and private key pair, exchanged the public key by post, and they are now ready to correspond.

Alice used the public key of Bob to encrypt and send their first top secret email.

What is true?

A  Alice should have used her own private key to encrypt the above mentioned message
B  Only Bob can decrypt and read the message using Alice's public key
C  Only Bob can decrypt and read the message using his own private key.
D  Anyone who can obtain Bob public key would be able to decrypt and read Alice's message
<< First < Previous Flashcard Next > Last >>
Exam Home Page
https://www.jobilize.com/sun-certified-enterprise-architect-scea

Oracle Certified Java Enterprise Architect

Author:

Access: Public Instant Grading

Attribution:  Oracle, Sun, Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Ask
Mike Wolf
Start Exam
Copy and paste the following HTML code into your website or blog.
<iframe src="https://www.jobilize.com/embed/sun-certified-enterprise-architect-scea" width="600" height="600" frameborder="0" marginwidth="0" marginheight="0" scrolling="yes" style="border:1px solid #CCC; border-width:1px 1px 0; margin-bottom:5px" allowfullscreen webkitallowfullscreen mozallowfullscreen> </iframe>