Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use
to verify that the email came from Joe and decrypt it? (Select TWO).
A.
The CA’s public key
B.
Ann’s public key
C.
Joe’s private key
D.
Ann’s private key
E.
The CA’s private key
F.
Joe’s public key
Explanation: