Information Security Officer Question:
Download Questions PDF

Tell me in public-key cryptography you have a public and a private key, and you often perform both encryption and signing functions. Which key is used for which function?

Answer:

You encrypt with the other person’s public key, and you sign with your own private. If they confuse the two, don’t put them in charge of your PKI project.

Download Information Security Professional Interview Questions And Answers PDF

Previous QuestionNext Question
Suppose you find PHP queries overtly in the URL, such as /index.php=?page=userID. What would you then be looking to test?Suppose you find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?