exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 338 discussion

Actual exam question from Cisco's 350-701
Question #: 338
Topic #: 1
[All 350-701 Questions]

What are two functions of secret key cryptography? (Choose two.)

  • A. utilization of less memory
  • B. utilization of large prime number iterations
  • C. utilization of different keys for encryption and decryption
  • D. key selection without integer factorization
  • E. provides the capability to only know the key on one side
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Initial14
Highly Voted 2 years, 7 months ago
It is A and D. This question is talking about symmetric key exchange. Symmetrical key exchange uses less memory ( compared to asymmetrical, that uses integer factorization) and does not use integer factorization
upvoted 17 times
Stevens0103
1 year, 3 months ago
But "utilization of less memory" is not a function.
upvoted 1 times
...
...
Carlis
Highly Voted 2 years, 1 month ago
Selected Answer: AD
The question is about differences between asymmetric and symmetric keys. secret key cryptography = symmetric cryptography A. utilization of less memory = symmetric keys B. utilization of large prime number iterations = public/private keys C. utilization of different keys for encryption and decryption = public/private keys D. key selection without integer factorization = public/private keys use integer factorization E. provides the capability to only know the key on one side = very sad formulation, but for symmetric keys, both sides need to know the key, whilst private key is only on one side
upvoted 10 times
stalkr3
2 years ago
^^^this
upvoted 2 times
...
...
kloug
Most Recent 6 months, 1 week ago
Answer a,e
upvoted 1 times
kloug
6 months, 1 week ago
A,d answer sorry
upvoted 1 times
...
...
1421494
8 months, 1 week ago
I vote for A, D.
upvoted 1 times
...
ums008
1 year, 9 months ago
Selected Answer: DE
D & E is correct: Functions of secret key cryptography (symmetric cryptography): Key selection without integer factorization (D): Secret key cryptography relies on selecting a secret key without the need for complex mathematical operations like integer factorization, which is used in public key cryptography. Provides the capability to only know the key on one side (E): In symmetric cryptography, both parties involved in communication need to possess the same secret key, which they keep private from others. This means that only the communicating parties should know the secret key.
upvoted 1 times
...
jku2cya
1 year, 9 months ago
Selected Answer: AD
Agree with the others around A and D being correct. B, C and E relate to public/private
upvoted 1 times
...
alischajan
2 years ago
Selected Answer: AD
A and D are the correct answers.
upvoted 1 times
...
stalkr3
2 years ago
"provides the capability to only know the key on one side" The proof that Cisco employs monkeys to formulate these questions
upvoted 1 times
...
Tuxzinator
2 years, 2 months ago
Selected Answer: CE
C E only good answers
upvoted 5 times
...
Emlia1
2 years, 5 months ago
I prefer A,D
upvoted 2 times
...
smartcarter
2 years, 5 months ago
A and D are correct.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago