Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need
to use to verify that the email came from Joe and decrypt it? (Select TWO).
A.
The CA’s public key
B.
Ann’s public key
C.
Joe’s private key
D.
Ann’s private key
E.
The CA’s private key
F.
Joe’s public key