CEH: Cryptographic Attacks and De...
Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. If Bob wants to send Alice an encrypted message with public key encryption, which key does Bob use to identify himself:
Bob's private key
Alice's public key
Bob's public key
Alice's private key