Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 329 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 329
Topic #: 1
[All 312-50v11 Questions]

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography.
What key does Bob use to encrypt the checksum for accomplishing this goal?

  • A. Alice's public key
  • B. His own public key
  • C. His own private key
  • D. Alice's private key
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lawbut2
Highly Voted 3 years ago
Correct. C. His own private key. Page 3065, CEH v11 "Sender sends hash code using his PRIVATE key"
upvoted 19 times
...
micka69
Highly Voted 3 years ago
Asymmetric Encryption uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption. As implied in the name, the Private Key is intended to be private so that only the authenticated recipient can decrypt the message.
upvoted 13 times
Brian_Tseng
2 years, 10 months ago
So... What is the answer?
upvoted 2 times
KumaraRashu
2 years, 9 months ago
Ans is A:Page 3020 CEHv11
upvoted 5 times
...
...
...
sam_kdr
Most Recent 3 weeks, 6 days ago
Selected Answer: C
Answer is none other than C. According to ChatGPT, when encrypting a message, the key used depends on the goal—either confidentiality or authenticity. In this case, latter applies; Authenticity and Integrity (Digital Signature). Therefore, the sender's private key is used to sign the message (or a checksum/hash of it) while the sender's public key is used by the recipient to verify the signature.
upvoted 1 times
...
Spam_Protection
8 months, 2 weeks ago
Selected Answer: A
Encryption. Not signing
upvoted 1 times
...
Selected Answer: A
ChatGPT answer: Correct answer: A. Alice's public key Explanation: Bob wants to ensure that Alice can check whether his message has been tampered with. To achieve this, he encrypts the checksum of the message using asymmetric cryptography. In asymmetric cryptography, there are two keys: a public key and a private key. The public key is used for encryption, and the private key is used for decryption. Bob uses Alice's public key for encryption: Bob wants Alice to be able to decrypt and verify the checksum. In asymmetric cryptography, anything encrypted with the public key can only be decrypted with the corresponding private key. Therefore, by encrypting the checksum with Alice's public key, only Alice (who possesses the corresponding private key) can decrypt and verify it.
upvoted 3 times
...
sudowhoami
1 year ago
Selected Answer: A
A is the correct choice. He uses Alice's public key to encrypt the message and Alice use her own private key to decrypt the message.
upvoted 1 times
...
12787
1 year, 1 month ago
Bob uses Alice's public key to encrypt the checksum. This is a common practice in asymmetric cryptography. Bob uses Alice's public key for encryption because only Alice, with access to the corresponding private key, can decrypt the message. This ensures that only Alice can verify the integrity of the message by decrypting the checksum and comparing it to a newly calculated checksum of the received message. Using Alice's public key for encryption adds an extra layer of security to ensure that the checksum is only accessible to the intended recipient.
upvoted 1 times
...
Vincent_Lu
1 year, 1 month ago
Selected Answer: C
His own private key
upvoted 1 times
12787
1 year, 1 month ago
In asymmetric you use the public key to encrypt the message then the recipiant uses their own private key to deycrypt.
upvoted 1 times
...
...
Buksi
1 year, 5 months ago
Encrypt the message -> Alice's public key Encrypt the checksum -> His own private key
upvoted 2 times
...
akailah88
1 year, 6 months ago
Selected Answer: C
Simply put, what is required is to ensure that the message has not been tampered with. What is correct is that the message is signed by the sender, which is bob by its public key. Method a is confidential, that is, the message can only be opened by the recipient. If the answer is C
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: A
The correct opción is A.
upvoted 2 times
...
victorfs
1 year, 6 months ago
Selected Answer: C
The correct option is C C. His own private key
upvoted 1 times
victorfs
1 year, 6 months ago
No really... I think is A, becausw you use your private key foro sign a message (digital signature), but you use the public key of the destinatary for encrypt the message! In this case i think IS similar, so the correct option is A. Finally.
upvoted 1 times
...
...
victorfs
1 year, 6 months ago
Selected Answer: A
The correcto option is A. Alice's public key. If you choose the C, Alice can't read the message!
upvoted 3 times
victorfs
1 year, 6 months ago
Alice should have your public key, bob
upvoted 1 times
victorfs
1 year, 6 months ago
To the end, the correct option is A. Remember!
upvoted 1 times
...
...
victorfs
1 year, 6 months ago
No really.. the option C could be correct too.
upvoted 1 times
victorfs
1 year, 6 months ago
To the end the correct option is A
upvoted 1 times
...
...
...
MGRavindra
1 year, 8 months ago
Bob will digitally sign the message using his private key. Bob will encrypt the message using Alice's public key - So only Alice can decrypt the message. The question talks about encryption. Hence Answer is A - Alice's public key
upvoted 5 times
...
Shin_Frankie
1 year, 9 months ago
Selected Answer: C
ambigious question, if use PGP is A, not is C
upvoted 1 times
...
VOAKDO
1 year, 10 months ago
A. Sign a message: sender's privatek-> senders's publick encrip. a message: receiver's publick-> receivers's private Here are "encripting", they never say "sign".
upvoted 2 times
...
jasonkym
1 year, 11 months ago
Selected Answer: A
The answer is A, Creating a checksum of a message does not equate to signing it. Bob just want Alice to be able to check if the message is has been tampered with. He does not want to sign it to proof that he is the sender of the message.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...