Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

classic Classic list List threaded Threaded
4 messages Options
Reply | Threaded
Open this post in threaded view
|

Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

jjamall
Hello every one
 
Can any one explain this answer. The corect answer is in bold.
 
 
Thanks an regards
 

Which of the following BEST provides e-mail message authenticity and confidentiality?

 



On Mon, Apr 22, 2013 at 8:39 PM, pgnair [via CISSP_Study] <[hidden email]> wrote:
 Mohamed,

Excellent powerpoint on ACL. Thank you very much for sharing.
prema
 
 
On 04/21/13, [hidden email] wrote:
 
Send CISSPstudy mailing list submissions to
[hidden email]


To subscribe or unsubscribe via the World Wide Web, visit
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
or, via email, send a message with subject or body 'help' to
[hidden email]


You can reach the person managing the list at
[hidden email]


When replying, please edit your Subject line so it is more specific
than "Re: Contents of CISSPstudy digest..."


Today's Topics:

1. Matrix Access Control Model (waleed zidan)


----------------------------------------------------------------------

Message: 1
Date: Sun, 21 Apr 2013 16:40:31 +0400
From: waleed zidan <[hidden email]>
To: [hidden email]

Subject: [CCCure CISSP] Matrix Access Control Model
Message-ID:
<CAL1tOF63mJUbbe8oNmRM=7kQaSriz8[hidden email]>

Content-Type: text/plain; charset="iso-8859-1"

there is very good power point presentation on this link for Matrix Access
Model

http://www.google.ae/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC8QFjAA&url=http%3A%2F%2Fsuanpalm3.kmutnb.ac.th%2Fteacher%2FFileDL%2Freuven232255213122.ppt&ei=U9lzUbrHFoHyrQeTqoGYCw&usg=AFQjCNETxkwPj3JULKNTUR1ngInYtHzU8A&sig2=SD8tXySm_HzWerLrpD2_sA&bvm=bv.45512109,d.bmk&cad=rja

--
Eng. Mohamed Waleed Zidan
IT Engineer
CCIE Security ID 36851
CCNP, CCSP,Mitel Certified
Mob: +971 55 1566719
Linkedin: http://www.linkedin.com/in/mzidan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cccure.org/mailman/private/cisspstudy_cccure.org/attachments/20130421/d3ce9cf0/attachment.html>

------------------------------

Subject: Digest Footer

_______________________________________________
You can search through the mailing list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]


To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org


------------------------------

End of CISSPstudy Digest, Vol 58, Issue 11
******************************************

_______________________________________________
You can find the list archive at:
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org



If you reply to this email, your message will be added to the discussion below:
http://cissp-study.3965.n7.nabble.com/CCCure-CISSP-CISSPstudy-Digest-Vol-58-Issue-11-tp255.html
To start a new topic under CISSP_Study, email [hidden email]
To unsubscribe from CISSP_Study, click here.
NAML

Reply | Threaded
Open this post in threaded view
|

Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

NGOGBEHEI innocent
The answer is correct. Remember this. You need a kep pair to perform encryption and decryption. A private key encrypts.... the corresponding public key is required to decrypts. 

So if the sender signs with his private key, it ensures authenticity bacause he's the only one that should have access to his private key. If the sender encrypts with the receiver public key, its ONLY the intended recipient that can decrypt the message hence it ensures Confidentiality. No one will be able to decrypt the message unless they have the recipient private keys.

Hope this helps.


Send from Samsung Mobile



-------- Original message --------
From: jjamall <[hidden email]>
Date:
To: [hidden email]
Subject: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11


Hello every one
 
Can any one explain this answer. The corect answer is in bold.
 
 
Thanks an regards
 

Which of the following BEST provides e-mail message authenticity and confidentiality?

 



On Mon, Apr 22, 2013 at 8:39 PM, pgnair [via CISSP_Study] <[hidden email]> wrote:
 Mohamed,

Excellent powerpoint on ACL. Thank you very much for sharing.
prema
 
 
On 04/21/13, [hidden email] wrote:
 
Send CISSPstudy mailing list submissions to
[hidden email]


To subscribe or unsubscribe via the World Wide Web, visit
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
or, via email, send a message with subject or body 'help' to
[hidden email]


You can reach the person managing the list at
[hidden email]


When replying, please edit your Subject line so it is more specific
than "Re: Contents of CISSPstudy digest..."


Today's Topics:

1. Matrix Access Control Model (waleed zidan)


----------------------------------------------------------------------

Message: 1
Date: Sun, 21 Apr 2013 16:40:31 +0400
From: waleed zidan <[hidden email]>
To: [hidden email]

Subject: [CCCure CISSP] Matrix Access Control Model
Message-ID:
<CAL1tOF63mJUbbe8oNmRM=7kQaSriz8[hidden email]>

Content-Type: text/plain; charset="iso-8859-1"

there is very good power point presentation on this link for Matrix Access
Model

http://www.google.ae/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC8QFjAA&url=http%3A%2F%2Fsuanpalm3.kmutnb.ac.th%2Fteacher%2FFileDL%2Freuven232255213122.ppt&ei=U9lzUbrHFoHyrQeTqoGYCw&usg=AFQjCNETxkwPj3JULKNTUR1ngInYtHzU8A&sig2=SD8tXySm_HzWerLrpD2_sA&bvm=bv.45512109,d.bmk&cad=rja

--
Eng. Mohamed Waleed Zidan
IT Engineer
CCIE Security ID 36851
CCNP, CCSP,Mitel Certified
Mob: +971 55 1566719
Linkedin: http://www.linkedin.com/in/mzidan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cccure.org/mailman/private/cisspstudy_cccure.org/attachments/20130421/d3ce9cf0/attachment.html>

------------------------------

Subject: Digest Footer

_______________________________________________
You can search through the mailing list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]


To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org


------------------------------

End of CISSPstudy Digest, Vol 58, Issue 11
******************************************

_______________________________________________
You can find the list archive at:
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org



If you reply to this email, your message will be added to the discussion below:
http://cissp-study.3965.n7.nabble.com/CCCure-CISSP-CISSPstudy-Digest-Vol-58-Issue-11-tp255.html
To start a new topic under CISSP_Study, email [hidden email]
To unsubscribe from CISSP_Study, click here.
NAML



View this message in context: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11
Sent from the CISSP_Study mailing list archive at Nabble.com.

_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
Reply | Threaded
Open this post in threaded view
|

Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

Doug Spindler
In reply to this post by jjamall

If you are asking this question it should like you have not studied public/private key encryption or are having a difficult time with the concept.  May I suggest studying message signing, hashing, encryption, PKI, public keys, private keys, CIA.  Once you understand the concepts it will become clear which keys are used for signing and why.  And which keys are used for encryption and why.  I would not try to memorize the answer without a full understanding of PKI.

 

Doug Spindler

 

 

 

 

From: CISSPstudy [mailto:[hidden email]] On Behalf Of jjamall
Sent: Sunday, April 28, 2013 6:59 AM
To: [hidden email]
Subject: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

 

Hello every one

 

Can any one explain this answer. The corect answer is in bold.

 

 

Thanks an regards

 

Which of the following BEST provides e-mail message authenticity and confidentiality?

  • ( )Signing the message using the sender's public key and encrypting the message using the receiver's private key
  • ›( )Signing the message using the sender's private key and encrypting the message using the receiver's public key
  • ( )Signing the message using the receiver's private key and encrypting the message using the sender's public key
  • (X)Signing the message using the receiver's public key and encrypting the message using the sender's private key

 

 

On Mon, Apr 22, 2013 at 8:39 PM, pgnair [via CISSP_Study] <[hidden email]> wrote:

 Mohamed,

Excellent powerpoint on ACL. Thank you very much for sharing.
prema

 

 

On 04/21/13, [hidden email] wrote:

 

Send CISSPstudy mailing list submissions to

[hidden email]



To subscribe or unsubscribe via the World Wide Web, visit
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
or, via email, send a message with subject or body 'help' to

[hidden email]



You can reach the person managing the list at

[hidden email]



When replying, please edit your Subject line so it is more specific
than "Re: Contents of CISSPstudy digest..."


Today's Topics:

1. Matrix Access Control Model (waleed zidan)


----------------------------------------------------------------------

Message: 1
Date: Sun, 21 Apr 2013 16:40:31 +0400

From: waleed zidan <[hidden email]>
To: [hidden email]


Subject: [CCCure CISSP] Matrix Access Control Model
Message-ID:

<CAL1tOF63mJUbbe8oNmRM=7kQaSriz8[hidden email]>


Content-Type: text/plain; charset="iso-8859-1"

there is very good power point presentation on this link for Matrix Access
Model

http://www.google.ae/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC8QFjAA&url=http%3A%2F%2Fsuanpalm3.kmutnb.ac.th%2Fteacher%2FFileDL%2Freuven232255213122.ppt&ei=U9lzUbrHFoHyrQeTqoGYCw&usg=AFQjCNETxkwPj3JULKNTUR1ngInYtHzU8A&sig2=SD8tXySm_HzWerLrpD2_sA&bvm=bv.45512109,d.bmk&cad=rja

--
Eng. Mohamed Waleed Zidan
IT Engineer
CCIE Security ID 36851
CCNP, CCSP,Mitel Certified
Mob: +971 55 1566719
Linkedin: http://www.linkedin.com/in/mzidan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cccure.org/mailman/private/cisspstudy_cccure.org/attachments/20130421/d3ce9cf0/attachment.html>

------------------------------

Subject: Digest Footer

_______________________________________________
You can search through the mailing list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list

[hidden email]



To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org


------------------------------

End of CISSPstudy Digest, Vol 58, Issue 11
******************************************


_______________________________________________
You can find the list archive at:

[hidden email]


To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org


If you reply to this email, your message will be added to the discussion below:

http://cissp-study.3965.n7.nabble.com/CCCure-CISSP-CISSPstudy-Digest-Vol-58-Issue-11-tp255.html

To start a new topic under CISSP_Study, email [hidden email]
To unsubscribe from CISSP_Study, click here.
NAML

 

 


View this message in context: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11
Sent from the CISSP_Study mailing list archive at Nabble.com.


_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
Reply | Threaded
Open this post in threaded view
|

Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

cissp_student_01
In reply to this post by jjamall
signing the message with sender private key which means any with the sender public key can know that it is the same from the same person . For example Bob signed the message with his private and send it to Alice she can use bob's public key which conforms to her that the message is actually from Bob

encrypting the message with receiver public key provides confidentality means only the concern party with private key can decrypt the message.
Eg : If Bob send a message to Alice Bob uses Alice public key to encrypt. However, Alice with her private can decrypt the message using her private key.

Hope this helps


Date: Sun, 28 Apr 2013 06:58:32 -0700
From: [hidden email]
To: [hidden email]
Subject: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11

Hello every one
 
Can any one explain this answer. The corect answer is in bold.
 
 
Thanks an regards
 

Which of the following BEST provides e-mail message authenticity and confidentiality?

 


On Mon, Apr 22, 2013 at 8:39 PM, pgnair [via CISSP_Study] <[hidden email]> wrote:
 Mohamed,

Excellent powerpoint on ACL. Thank you very much for sharing.
prema
 
 
On 04/21/13, [hidden email] wrote:
 
Send CISSPstudy mailing list submissions to
[hidden email]


To subscribe or unsubscribe via the World Wide Web, visit
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
or, via email, send a message with subject or body 'help' to
[hidden email]


You can reach the person managing the list at
[hidden email]


When replying, please edit your Subject line so it is more specific
than "Re: Contents of CISSPstudy digest..."


Today's Topics:

1. Matrix Access Control Model (waleed zidan)


----------------------------------------------------------------------

Message: 1
Date: Sun, 21 Apr 2013 16:40:31 +0400
From: waleed zidan <[hidden email]>
To: [hidden email]

Subject: [CCCure CISSP] Matrix Access Control Model
Message-ID:
<CAL1tOF63mJUbbe8oNmRM=7kQaSriz8[hidden email]>

Content-Type: text/plain; charset="iso-8859-1"

there is very good power point presentation on this link for Matrix Access
Model

http://www.google.ae/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC8QFjAA&url=http%3A%2F%2Fsuanpalm3.kmutnb.ac.th%2Fteacher%2FFileDL%2Freuven232255213122.ppt&ei=U9lzUbrHFoHyrQeTqoGYCw&usg=AFQjCNETxkwPj3JULKNTUR1ngInYtHzU8A&sig2=SD8tXySm_HzWerLrpD2_sA&bvm=bv.45512109,d.bmk&cad=rja

--
Eng. Mohamed Waleed Zidan
IT Engineer
CCIE Security ID 36851
CCNP, CCSP,Mitel Certified
Mob: +971 55 1566719
Linkedin: http://www.linkedin.com/in/mzidan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cccure.org/mailman/private/cisspstudy_cccure.org/attachments/20130421/d3ce9cf0/attachment.html>

------------------------------

Subject: Digest Footer

_______________________________________________
You can search through the mailing list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]


To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org


------------------------------

End of CISSPstudy Digest, Vol 58, Issue 11
******************************************

_______________________________________________
You can find the list archive at:
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org



If you reply to this email, your message will be added to the discussion below:
http://cissp-study.3965.n7.nabble.com/CCCure-CISSP-CISSPstudy-Digest-Vol-58-Issue-11-tp255.html
To start a new topic under CISSP_Study, email [hidden email]
To unsubscribe from CISSP_Study, <a href="http://" target="_blank" rel="nofollow">click here.
NAML



View this message in context: Re: [CCCure CISSP] CISSPstudy Digest, Vol 58, Issue 11
Sent from the CISSP_Study mailing list archive at Nabble.com.

_______________________________________________ You can find the list archive at: http://cissp-study.3965.n7.nabble.com/ CISSPstudy mailing list [hidden email] To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below: http://cccure.org/mailman/listinfo/cisspstudy_cccure.org

_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org