{"id":291,"date":"2022-02-25T19:43:04","date_gmt":"2022-02-25T19:36:37","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question150\/"},"modified":"2022-02-25T19:46:25","modified_gmt":"2022-02-25T19:46:25","slug":"certified-ethical-hacker-v11-312-50v11-question150","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question150\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question150"},"content":{"rendered":"<div class=\"question\">Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?<br \/><strong><br \/>A.<\/strong> Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian&#039;s private key.<br \/><strong>B.<\/strong> Dorian is signing the message with Poly&#039;s private key, and Poly will verify that the message came from Dorian by using Dorian&#039;s public key.<br \/><strong>C.<\/strong> Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian&#039;s public key.<br \/><strong>D.<\/strong> Dorian is signing the message with Poly&#039;s public key, and Poly will verify that the message came from Dorian by using Dorian&#039;s public key.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?A. Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian&#039;s private key.B. Dorian is signing the message with Poly&#039;s private [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,153],"class_list":["post-291","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-150"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":518,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/291\/revisions\/518"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}