Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 4 Question 17 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 17
Topic #: 4
[All ISSAP Questions]

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Show Suggested Answer Hide Answer
Suggested Answer: C

data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The

public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a

message sender or encrypting a message.

Answer option D is incorrect. Group Temporal Key (GTK) is a random value that is assigned by the broadcast/multicast source. It is used to

protect broadcast/multicast medium access control (MAC) protocol data units. It is derived from a group master key (GMK).

Answer option B is incorrect. Pairwise Transient Key (PTK) is a 64-byte key that comprises the following:

16 bytes of EAPOL-Key Confirmation Key (KCK): This key is used to compute MIC on WPA EAPOL Key message.

16 bytes of EAPOL-Key Encryption Key (KEK): AP uses this key to encrypt additional data sent (in the 'Key Data' field) to the client.

16 bytes of Temporal Key (TK): This key is used to encrypt/decrypt unicast data packets.

8 bytes of Michael MIC Authenticator Tx Key: This key is used to compute MIC on unicast data packets transmitted by the AP.

8 bytes of Michael MIC Authenticator Rx Key: This key is used to compute MIC on unicast data packets transmitted by the station.

Pairwise Transient Key is derived from the pairwise master key (PMK), Authenticator address (AA), Supplicant address (SPA), Authenticator

nonce (A Nonce), and Supplicant nonce (S Nonce) using pseudo-random function (PRF).

Answer option A is incorrect. Pairwise Master Key (PMK) is the highest order key used within the 802.11i amendment. It is derived directly from

a preshared key and can also be derived from the Extensible Authentication Protocol (EAP). It is a cryptography key that is used to derive

lower level keys.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77