exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 38 discussion

Actual exam question from CompTIA's SY0-501
Question #: 38
Topic #: 1
[All SY0-501 Questions]

Which of the following encryption methods does PKI typically use to securely protect keys?

  • A. Elliptic curve
  • B. Digital signatures
  • C. Asymmetric
  • D. Obfuscation
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Basem
Highly Voted 5 years, 11 months ago
It is Asymetric. Since in all cases web or email Asymetric encryption is used to send a private (session key). Eliptical curve is a way of generating Asymetric keys. It is a poorly worded question though and hard to really pin point the answer but it is most likely Asymetric.
upvoted 9 times
...
andev08
Highly Voted 6 years, 5 months ago
Asymmetric
upvoted 6 times
...
OShpapi
Most Recent 4 years, 6 months ago
Apublickeyinfrastructure(PKI)is a system that is composed ofcertificate authorities,certificates, software, services, and other cryptographic components, for the purpose of enablingauthenticity and validation of data and entities. The PKI can be implemented in various hierarchicalstructures and can be publicly available or maintained privately by an organization. As its nameimplies, a PKI implements asymmetric cryptography for the encryption and decryption of networkdata, including transactions over the Internet. Pamela J. TaylorJason Nufryk
upvoted 1 times
...
lionleo
4 years, 9 months ago
Answer C is Correct because Digital signatures — Digital signatures are what guarantees that a message, file, or data hasn’t been altered in any way. It uses an encrypted hash of a message to ensure the integrity of your data by making it so that nobody can modify the message without the recipient finding out.
upvoted 1 times
...
CoRell
5 years ago
Actually, this question says "methods", so it should be B and D.
upvoted 1 times
...
cobaintan
5 years, 1 month ago
Asymmetric use in PKI and PGP
upvoted 1 times
...
henry76
5 years, 2 months ago
"....encryption methods ..." Asymetric is the answer
upvoted 2 times
...
renegade_xt
5 years, 2 months ago
Asymmetric https://blog.finjan.com/what-is-public-key-infrastructure-pki-and-how-is-it-used-in-cyber-security/
upvoted 1 times
...
shyamash
5 years, 4 months ago
Asymmetric
upvoted 1 times
...
rahimtolba
5 years, 7 months ago
Answer: C Keyword: "...securely protect keys" The question here is looking for an envelope encryption method. That is protection of encrypted keys. Normally you would encrypt data with a symmetric algorithm AES for example and use Public/Private keys to encrypt/decrypt the encrypted key known to be envelope encryption. The method is clarified here: https://ironcorelabs.com/docs/concepts/envelope-encryption/
upvoted 1 times
...
Lains2019
5 years, 8 months ago
I think it’s Digital Signature because it is asking how to protect the private key. Not process
upvoted 3 times
redondo310
5 years, 8 months ago
Just an alternative thought. Very tricky/misleading question... When it says "which methods", I personally read this as ASYM/SYM since these are the two methods we use today for encryption. A digital signature is really just a part of the process. It takes both the hash value of the content/message and the private key to create the digital signature. Since you are talking about using senders private key to create the hash, and the receiver uses the public key to decrypt the hash, it would more lead me to the asymmetrical answer.
upvoted 4 times
...
Heymannicerouter
4 years, 4 months ago
Signatures don't protect anything, they just provide integrity and non-repudiation, not confidentiality.
upvoted 2 times
...
...
ploy
5 years, 10 months ago
ref: https://blog.finjan.com/what-is-public-key-infrastructure-pki-and-how-is-it-used-in-cyber-security/ Public Key Infrastructure (PKI) uses a combination of asymmetric and symmetric processes. An initial “handshake” between communicating parties uses asymmetric encryption to protect the secret key which is exchanged to enable symmetric encryption
upvoted 4 times
...
billie
5 years, 11 months ago
the other dump said Digital Signature. But this one is correct on the exam right?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...