When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?

Posted by: Pdfprep Category: 210-250 Tags: , ,

When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?
A . the digital signature of the original image
B . the public key that was used to sign the original image
C . the private key that was used to sign the original image
D . the public and private keys that were used to sign the original image

Answer: C

Leave a Reply

Your email address will not be published.