[
Log On
]
Home
Tst
Cha
Enc
Code
IP
Fun
Sub
DigF
Cis
Com
Db
About
Netsim
CEH: Cryptographic Attacks and De...
Calculating your score ...
Back
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. If Bob wants to send Alice an encrypted message with public key encryption, which key does Bob use to identify himself:
Bob's private key
Alice's public key
Bob's public key
Alice's private key