Which of the following attack scenarios will compromise the privacy of her data?

Posted by: Pdfprep Category: CPEH-001 Tags: , ,

Alice encrypts her data using her public key PK and stores the encrypted data in the cloud.

Which of the following attack scenarios will compromise the privacy of her data?
A . None of these scenarios compromise the privacy of Alice’s data
B . Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew’s attempt to access the stored data
C . Hacker Harry breaks into the cloud server and steals the encrypted data
D . Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before

Answer: D

Leave a Reply

Your email address will not be published.