Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 4 Question 97 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 97
Topic #: 4
[All CPEH-001 Questions]

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob's public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob's public key and use it to verify Bob's signature, they cannot discover Bob's private key and use it to forge digital signatures. What does this principle refer to?

Show Suggested Answer Hide Answer
Suggested Answer: D

PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other.


Contribute your Thoughts:

Brande
2 months ago
Asymmetry all the way! The whole beauty of public-key crypto is that the public key can be used to encrypt, but the private key is the only way to decrypt. Nicely done, test writer!
upvoted 0 times
Mabel
24 days ago
D) Asymmetry
upvoted 0 times
...
Dannette
26 days ago
C) Symmetry
upvoted 0 times
...
Serita
1 months ago
B) Non-repudiation
upvoted 0 times
...
Krissy
1 months ago
A) Irreversibility
upvoted 0 times
...
...
Kenia
2 months ago
Haha, I love these cryptography questions. They're like little puzzles. This one's a classic example of asymmetric encryption - the public and private keys are a perfect match!
upvoted 0 times
...
Phuong
2 months ago
Ooh, tricky one! I was thinking Irreversibility at first, but then I realized that's more about the difficulty of reversing the encryption, not the key relationship. Definitely Asymmetry.
upvoted 0 times
Karan
1 months ago
Yes, the principle refers to Asymmetry in this context.
upvoted 0 times
...
Audra
1 months ago
Asymmetry is the correct answer in this case.
upvoted 0 times
...
Sherell
1 months ago
I agree, it's definitely Asymmetry.
upvoted 0 times
...
...
Barney
2 months ago
Hmm, I was kind of torn between Asymmetry and Non-repudiation, but I think Asymmetry is the best fit. The whole point is that the private key can't be derived from the public key, which is the essence of asymmetry.
upvoted 0 times
...
Lili
2 months ago
I believe the correct answer is D) Asymmetry, as only Helga can decrypt the message with his private key.
upvoted 0 times
...
Audra
2 months ago
This seems pretty straightforward. Asymmetry is the key principle behind public-key cryptography, where the public and private keys are different but mathematically related. Totally makes sense here.
upvoted 0 times
Nettie
1 months ago
D) Asymmetry
upvoted 0 times
...
Abraham
1 months ago
C) Symmetry
upvoted 0 times
...
Selma
1 months ago
B) Non-repudiation
upvoted 0 times
...
Fernanda
2 months ago
A) Irreversibility
upvoted 0 times
...
...
Ashley
3 months ago
I think the principle refers to non-repudiation.
upvoted 0 times
...
Helga
3 months ago
I agree with Ashley, it makes sense that only Helga can read the message.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77