ethical-hacker video for your organization has a public key infrastructure set up. Your colleague Bernard wants to send a message to Joan. Therefore, Bernard
Your organization has a public key infrastructure set up. Your colleague Bernard wants to send a message to Joan. Therefore, Bernard both encrypts the message and digitally signs it. Bernard uses ____ to encrypt the message for these purposes, and Joan uses ____ to confirm the digital signature.