A systems administrator needs to send a sensitive file, report.txt, to a colleague. The colleague's public key is already in the administrator's keyring, associated with the email [email protected]. The administrator must ensure that only the intended colleague can decrypt and read the file's contents. Which of the following commands will accomplish this task?
The correct command is gpg --encrypt --recipient [email protected] report.txt. The --encrypt or -e option tells GPG to encrypt the data. The --recipient or -r option is used to specify the recipient's public key that should be used for encryption. This ensures that only the person holding the corresponding private key (the colleague) can decrypt the file.
The gpg --symmetric report.txt command is incorrect because it performs symmetric encryption, which uses a shared passphrase rather than a recipient's public key. The gpg --sign report.txt command is incorrect as it only creates a digital signature to verify the file's integrity and sender's identity but does not encrypt the file's contents for confidentiality. The gpg --import report.txt command is used for importing keys into a keyring, not for encrypting files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between symmetric and asymmetric encryption?
Open an interactive chat with Bash
What does the `--recipient` option do in GPG?
Open an interactive chat with Bash
Why is `gpg --symmetric report.txt` not suitable for this scenario?
Open an interactive chat with Bash
CompTIA Linux+ XK0-006 (V8)
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access