{"id":73,"date":"2020-03-29T09:07:24","date_gmt":"2020-03-29T08:07:24","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question060\/"},"modified":"2020-03-29T09:07:24","modified_gmt":"2020-03-29T08:07:24","slug":"certified-ethical-hacker-312-50v10-question060","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question060\/","title":{"rendered":"Certified Ethical Hacker 312-50v10 &#8211; Question060"},"content":{"rendered":"<div class=\"question\">Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?<br \/>\n<br \/><strong><br \/>A.<\/strong> None of these scenarios compromise the privacy of Alices data <br \/><strong>B.<\/strong> Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrews attempt to access the stored data <br \/><strong>C.<\/strong> Hacker Harry breaks into the cloud server and steals the encrypted data <br \/><strong>D.<\/strong> Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data? A. None of these scenarios compromise the privacy of Alices data B. Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[3,63],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/73"}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/categories?post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/tags?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}