An administrator receives a security alert that appears to be from one of the company’s vendors.
The email contains information and instructions for patching a serious flaw that has not been
publicly announced. Which of the following can an employee use to validate the authenticity if the
email?
A.
Hashing algorithm
B.
Ephemeral Key
C.
SSL certificate chain
D.
Private key
E.
Digital signature
D. Private Key
This is E – Digital Signature. A hashing algorithm is used as part of the process to create the digital signature, but a digital signature is more comprehensive.
I like what David said “Digital Signature is more comprehensive”. I pick E too!
I like E as well.