mrbinary wrote: » The answer, of course, is for Bob to send a message from his system encrypted with his private key.
mrbinary wrote: » Bob sees this request, and so does Badguy. Both send her a public key that says “Bob’s Public Key.” Susan is now confused, because she does not know which key is the real one.
mrbinary wrote: » WHAT IS STOPPING the bad guy from also attempting this?
mrbinary wrote: » why is the private key being sent out or is it not being sent out just used to encrypt the message?
mrbinary wrote: » who is the HE they are referring to here. should it not have been the CA instead of he?
mrbinary wrote: » i have my security+ obtained reading darill gibson book. this is the cehv7 i am now pursuing reading CEH Certified Ethical Hacker All-in-One Exam Guide authoer matt walker. just was confused by his scenario so i thought i get clarification here.