During an audit of an enterprise that is dedicated to
e-commerce, the IS manager states that digital signatures
are used in the establishment of its commercial relations.
To substantiate this, the IS auditor must prove that which
of the following is used?
A. A biometric, digitalized and encrypted parameter with the
customer's public key
B. A hash of the data that is transmitted and encrypted with
the customer's private key
C. A hash of the data that is transmitted and encrypted with
the customer's public key
D. The customer's scanned signature, encrypted with the
customer's public key
Answer Posted / guest
Answer: C
The calculation of a hash or digest of the data that is
transmitted and its encryption requires the public key of
the client (receiver) and is called a signature of the
message or digital signature. The receiver performs the same
process and then compares the received hash once it has been
decrypted with his/her private key, with the hash that
he/she calculates with the received data. If they are the
same, the conclusion would be that there is integrity in the
data that has arrived and the origin is authenticated.
Is This Answer Correct ? | 3 Yes | 9 No |
Post New Answer View All Answers