Question: please need help with these thank you Partial Question 4 0.67 /2 pts Which of the following can lead to successful breach of encrypted information

 please need help with these thank you Partial Question 4 0.67
/2 pts Which of the following can lead to successful breach of
encrypted information against websites using HTTPS? Phishing emails Falufy information to obtain
please need help with these thank you

Partial Question 4 0.67 /2 pts Which of the following can lead to successful breach of encrypted information against websites using HTTPS? Phishing emails Falufy information to obtain digital certificate from a root CA Man-in-the-middle to defeat encryption Steal private key of the website al Incorrect Question 5 0/1 pts Alice and Bob are strangers. Alice wants Bob to send her a private message A and be able to verify the integrity of the message. What should Bob do? (h() is a hash function and assume both Alice and Bob knows h0). Bob generates an encryption key k and relies on PKI to send Alice X, Y, H where Y=PubEbob-pub,k), X-SymEk,A), H-SymE(k, h(A)). This works This does not work because Alice cannot verify Bob's public key This does not work because while Alice can receive message A but cannot verify the integrity of the message This does not work because Alice cannot recover the decryption keyk as she does not know Bob's private key sional Incorrect Question 7 0/1 pts Alice and Bob are strangers. Alice wants Bob to send her a private message A and be able to verify the integrity of the message. What should Bob do? (h() is a hash function and assume both Alice and Bob knows h0). Bob generates an encryption key k and relies on PKI to send Alice X, Y, H where Y=PubE(bob-pri,k), X-SymE(k.A), H-PubE(alice-pub, h(A)). This does not work because Alice cannot have access to the encryption key k it This does not work because Alice cannot verify Bob's public key This works essional This does not work because this message can be read by anyone

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!