Hard1 markMultiple Choice
CPA · Question 54 · Area II: Security
A company uses 'Asymmetric' encryption for secure email. If Alice wants to send a confidential email to Bob that only Bob can read, which key does she use to encrypt it?
A company uses 'Asymmetric' encryption for secure email. If Alice wants to send a confidential email to Bob that only Bob can read, which key does she use to encrypt it?
Answer options:
A.
Alice's Public Key
B.
Bob's Public Key
C.
Alice's Private Key
D.
Bob's Private Key
How to approach this question
Confidentiality = Recipient's Public Key. Authentication = Sender's Private Key.
Full Answer
B.Bob's Public Key✓ Correct
B
To ensure confidentiality in asymmetric encryption, the sender encrypts the message using the recipient's Public Key. Only the recipient possesses the corresponding Private Key to decrypt it.
Common mistakes
Confusing encryption (for secrecy) with signing (for identity).
Practice the full CPA ISC Practice Exam 3
82 questions · hints · full answers · grading
More questions from this exam
Q01A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based s...MediumQ02During a review of a client's cloud governance structure, an auditor notes that the client uses a...MediumQ03An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan ...HardQ04A company uses a batch processing system to update inventory records overnight. The 'Grandfather-...HardQ05During a walkthrough of the change management process, an auditor observes that the 'Developer' r...Medium
Expert