Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 6 Question 59 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 59
Topic #: 6
[All ISSAP Questions]

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B, D

widely distributed. A message encrypted with a recipient's public key cannot be decrypted by anyone except the owner of that key and the

person associated with the public key used. This is used for confidentiality. A message signed with a sender's private key can be verified by

anyone who has access to the sender's public key.

Answer options A and C are incorrect. Because of the asymmetric behavior of the keys, the secret key can encrypt a message, and anyone

with the public key can decrypt it. The distinguishing technique used in public key-private key cryptography is the use of asymmetric key

algorithms because the key used to encrypt a message is not the same as the key used to decrypt it.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77