exam questions

Exam 210-260 All Questions

View all questions & answers for the 210-260 exam

Exam 210-260 topic 1 question 139 discussion

Actual exam question from Cisco's 210-260
Question #: 139
Topic #: 1
[All 210-260 Questions]

What mechanism does asymmetric cryptography use to secure data?

  • A. a public/private key pair
  • B. shared secret keys
  • C. an RSA nonce
  • D. an MD5 hash
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
Reference:
http://searchsecurity.techtarget.com/definition/asymmetric-cryptography

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...