When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?

When an attacker modifies a system image that has been digitally signed, what does the attacker need in order to also change the digital signature of the image?
A. the digital signature of the original image
B. the public key that was used to sign the original image
C. the private key that was used to sign the original image
D. the public and private keys that were used to sign the original image

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.