The CISA Review Manual (Source 1) clarifies that digital signatures validate authenticity and integrity without requiring message encryption.
The Sybex Study Guide (Source 2) corroborates this, highlighting that digital signatures rely on hashing and asymmetric cryptography for verification, independent of message encryption.
A digital signature is based on public-key cryptography and remains authentic regardless of whether the message itself is encrypted. Encryption ensures confidentiality, but the digital signature only verifies the message's authenticity and integrity.
option D is not correct as the public key is used to verify the signature, it is not used to decrypt the message. The sender typically encrypts the message with the recipient's public key, and the recipient uses their private key to decrypt it.
i go with option C
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
46080f2
1 week, 5 days agoCisagroup
4 weeks agoblehbleh
5 months, 2 weeks agoPurpleParrot
6 months, 3 weeks ago