New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.18 Exam - Topic 5 Question 65 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 65
Topic #: 5
[All S90.18 Questions]

Service A hashes a message, resulting in message digest X. Service A encrypts the message digest X with its private key, resulting ir ciphertext X1. Service A sends the message and X1 to Service B . Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's public key, recovering message digest X. Service B compares Y with X and finds them to be equal. This proves that:

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Mabelle
4 months ago
All of the above makes sense to me!
upvoted 0 times
...
Verda
4 months ago
Public key cryptography is definitely in play here.
upvoted 0 times
...
Britt
4 months ago
Wait, how does this prove that? Sounds a bit off.
upvoted 0 times
...
Dolores
4 months ago
Totally agree, but also, only Service A could've sent it.
upvoted 0 times
...
King
4 months ago
The message was not altered, that's a key point!
upvoted 0 times
...
Ellsworth
5 months ago
I definitely recall that public key cryptography was involved, but I’m not sure if that’s the only thing we can conclude from this scenario. It feels like there's more to it.
upvoted 0 times
...
Dorothy
5 months ago
I feel like I might be mixing up the concepts here. I know that comparing the digests shows integrity, but does it really confirm that only Service A sent the message?
upvoted 0 times
...
Skye
5 months ago
This reminds me of a practice question where we had to identify what a digital signature proves. I think it might be option D since it covers all aspects mentioned.
upvoted 0 times
...
Kristin
5 months ago
I remember studying how hashing and encryption work together, but I'm not entirely sure if the answer is just about the message being unaltered or if it proves more than that.
upvoted 0 times
...
Reita
5 months ago
I'm feeling pretty confident about this one. Case sensitivity is a common programming concept, so I think I can apply that knowledge to select the right answer.
upvoted 0 times
...
Craig
5 months ago
I think the fishbone diagram is sometimes called a cause and effect diagram, but I'm not entirely sure.
upvoted 0 times
...
Lynda
5 months ago
I remember discussing the importance of using non-root accounts for administrative tasks. Using the root account seems risky.
upvoted 0 times
...
Marisha
5 months ago
I'm pretty confident about this one. HTTPS uses TCP port 443 as the default port, and it's a protocol used in the URL address line to connect to a secure site.
upvoted 0 times
...

Save Cancel