A large multinational corporation is implementing a secure email system that requires messages to be digitally signed. The CISO wants to ensure the system provides strong non-repudiation capabilities. Which of the following best describes how digital signatures provide non-repudiation in this scenario?
The digital signature is created using the sender's private key, which is under their control, making it difficult to deny sending the message
The digital signature adds a trusted timestamp to each message that is validated by multiple third parties
The digital signature requires a certificate authority to validate each transaction in real-time before delivery
The digital signature encrypts the message content so that it can be decrypted by the intended recipient
Digital signatures provide non-repudiation because they use the sender's private key, which should be known only to the sender. Since the private key is under the sender's control, they cannot credibly deny having created the signature, thus establishing accountability. Recipients verify the signature using the sender's public key, confirming the message came from the claimed sender.
The incorrect options misrepresent how digital signatures work. They don't inherently include timestamps, don't encrypt the message (they encrypt a hash of the message), and don't require real-time CA validation for each transaction.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital signature and how does it work?
Open an interactive chat with Bash
What does non-repudiation mean in cybersecurity?
Open an interactive chat with Bash
What is the difference between a private key and a public key?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access