Posted by: Pdfprep
Post Date: November 9, 2020
When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?
A . the digital signature of the original image
B . the public key that was used to sign the original image
C . the private key that was used to sign the original image
D . the public and private keys that were used to sign the original image
Answer: C
Leave a Reply