security+ study group
sysadmin101
Member Posts: 31 ■□□□□□□□□□
in Security+
Okay i will start. I am struggling with Asymmetric. I know it uses 2 keys 1 private and 1 public.
If A want to send digitally signed file to B. What type of key does A use?
If A want to send digitally signed file to B. What type of key does A use?
Comments
-
coldbug Member Posts: 189A web server crashed because of a denial of service attack against it. Based on the order of volatility, which evidence would you try to preserve?
(EDIT: use open ended questions, helps with the learning process)"If you want to kick the tiger in his ass, you'd better have a plan for dealing with his teeth." -
nisti2 Member Posts: 503 ■■■■□□□□□□Maybe in that order:
Cache
Ram
Logs
HD2020 Year goals:
Already passed: Oracle Cloud, AZ-900
Taking AZ-104 in December.
"Certs... is all about IT certs!"