Which of the following can an employee use to validate the authenticity if the email?

An administrator receives a security alert that appears to be from one of the company’s vendors.
The email contains information and instructions for patching a serious flaw that has not been
publicly announced. Which of the following can an employee use to validate the authenticity if the
email?

An administrator receives a security alert that appears to be from one of the company’s vendors.
The email contains information and instructions for patching a serious flaw that has not been
publicly announced. Which of the following can an employee use to validate the authenticity if the
email?

A.
Hashing algorithm

B.
Ephemeral Key

C.
SSL certificate chain

D.
Private key

E.
Digital signature



Leave a Reply 4

Your email address will not be published. Required fields are marked *

ten − 9 =


emmcee

emmcee

D. Private Key

David

David

This is E – Digital Signature. A hashing algorithm is used as part of the process to create the digital signature, but a digital signature is more comprehensive.

Lake

Lake

I like what David said “Digital Signature is more comprehensive”. I pick E too!

Will

Will

I like E as well.