Which of the following solutions is most likely to accomplish this?

Susan is trying to find a solution that will verify emails come from the source claimed. Which of the following solutions is most likely to accomplish this?

Susan is trying to find a solution that will verify emails come from the source claimed. Which of the following solutions is most likely to accomplish this?

A.
Any hashing

B.
AES encryption

C.
SHA hashing

D.
Digital signatures

Explanation:
Digital signatures encrypt with tine senders private key, then anyone with the public key can decrypt and verify the sender.



Leave a Reply 0

Your email address will not be published. Required fields are marked *