Page 479 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 479
9. Richard received an encrypted message sent to him from Sue.
Which key should he use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
10. Richard wants to digitally sign a message he’s sending to Sue so
that Sue can be sure the message came from him without
modification while in transit. Which key should he use to encrypt
the message digest?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
11. Which one of the following algorithms is not supported by the
Digital Signature Standard?
A. Digital Signature Algorithm
B. RSA
C. El Gamal DSA
D. Elliptic Curve DSA
12. Which International Telecommunications Union (ITU) standard
governs the creation and endorsement of digital certificates for
secure electronic communication?
A. X.500
B. X.509
C. X.900
D. X.905
13. What cryptosystem provides the encryption/decryption technology

