It is Asymetric. Since in all cases web or email Asymetric encryption is used to send a private (session key).
Eliptical curve is a way of generating Asymetric keys.
It is a poorly worded question though and hard to really pin point the answer but it is most likely Asymetric.
Apublickeyinfrastructure(PKI)is a system that is composed ofcertificate authorities,certificates, software, services, and other cryptographic components, for the purpose of enablingauthenticity and validation of data and entities. The PKI can be implemented in various hierarchicalstructures and can be publicly available or maintained privately by an organization. As its nameimplies, a PKI implements asymmetric cryptography for the encryption and decryption of networkdata, including transactions over the Internet.
Pamela J. TaylorJason Nufryk
Answer C is Correct because
Digital signatures — Digital signatures are what guarantees that a message, file, or data hasn’t been altered in any way. It uses an encrypted hash of a message to ensure the integrity of your data by making it so that nobody can modify the message without the recipient finding out.
Answer: C
Keyword: "...securely protect keys"
The question here is looking for an envelope encryption method. That is protection of encrypted keys. Normally you would encrypt data with a symmetric algorithm AES for example and use Public/Private keys to encrypt/decrypt the encrypted key known to be envelope encryption. The method is clarified here:
https://ironcorelabs.com/docs/concepts/envelope-encryption/
Just an alternative thought. Very tricky/misleading question... When it says "which methods", I personally read this as ASYM/SYM since these are the two methods we use today for encryption. A digital signature is really just a part of the process. It takes both the hash value of the content/message and the private key to create the digital signature. Since you are talking about using senders private key to create the hash, and the receiver uses the public key to decrypt the hash, it would more lead me to the asymmetrical answer.
ref: https://blog.finjan.com/what-is-public-key-infrastructure-pki-and-how-is-it-used-in-cyber-security/
Public Key Infrastructure (PKI) uses a combination of asymmetric and symmetric processes. An initial “handshake” between communicating parties uses asymmetric encryption to protect the secret key which is exchanged to enable symmetric encryption
the other dump said Digital Signature. But this one is correct on the exam right?
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.SY0-501 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Basem
Highly Voted 5 years, 11 months agoandev08
Highly Voted 6 years, 5 months agoOShpapi
Most Recent 4 years, 6 months agolionleo
4 years, 9 months agoCoRell
5 years agocobaintan
5 years, 1 month agohenry76
5 years, 2 months agorenegade_xt
5 years, 2 months agoshyamash
5 years, 4 months agorahimtolba
5 years, 7 months agoLains2019
5 years, 8 months agoredondo310
5 years, 8 months agoHeymannicerouter
4 years, 4 months agoploy
5 years, 10 months agobillie
5 years, 11 months ago