exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 405 discussion

Actual exam question from CompTIA's SY0-601
Question #: 405
Topic #: 1
[All SY0-601 Questions]

If a current private key is compromised, which of the following would ensure it cannot be used to decrypt all historical data?

  • A. Perfect forward secrecy
  • B. Elliptic-curve cryptography
  • C. Key stretching
  • D. Homomorphic encryption
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JT4
Highly Voted 1 year, 8 months ago
Just passed the exam with a score of 800 on 10/28/23. About 90% of the questions are from here. This question is on the exam.
upvoted 28 times
AspiringNerd
1 year, 1 month ago
lol dod you work for JT4?
upvoted 1 times
...
...
QEEN
Highly Voted 1 year, 6 months ago
Selected Answer: A
i hope i will pass the exam
upvoted 13 times
...
LordJaraxxus
Most Recent 1 year, 4 months ago
Selected Answer: A
In my opinion the answer is A: Perfect forward secrecy refers to session keys and provides assurances that session keys will not be compromised even if a private key is later compromised
upvoted 2 times
...
Selected Answer: A
Perfect forward secrecy (PFS) is a cryptographic property that ensures that even if a private key is compromised, it cannot be used to decrypt previously encrypted data. With PFS, a unique session key is generated for each session or communication, and the private key is used only to sign and exchange the session key. This means that even if an attacker gains access to the private key, they cannot use it to decrypt past sessions or communications.
upvoted 7 times
...
DWISE1
2 years, 3 months ago
a feature of specific key agreement protocols that assures session keys will not be compromised if long-term secrets (private key) used in session key exchange are compromised. indicates that a cryptographic system generates random public keys for each session and it does not use a deterministic algorithm in the process. given the same input, the algorithm will create a different public key, ensuing systems do not reuse keys. uses more computing power than if you’re using a single private key on a web server, so it will not be a fit for all scenarios. The value of forward secrecy is that it protects past communication, reducing motivation for an attacker to compromise keys
upvoted 1 times
...
ganymede
2 years, 3 months ago
Selected Answer: A
A. Perfect forward secrecy If a current private key is compromised, the use of Perfect Forward Secrecy (PFS) would ensure that it cannot be used to decrypt all historical data. Perfect Forward Secrecy (PFS) is a security feature that is used in certain encryption protocols to ensure that even if an attacker gains access to a private key, they cannot use it to decrypt previously intercepted data. Instead, the encryption protocol generates a unique session key for each session, which is not derived from the private key. If a current private key is compromised and Perfect Forward Secrecy (PFS) is not in use, an attacker could potentially use the compromised private key to decrypt all historical data that has been encrypted using that key.
upvoted 2 times
...
sdc939
2 years, 4 months ago
Selected Answer: A
A. Perfect forward secrecy
upvoted 2 times
...
Jibz18
2 years, 4 months ago
Selected Answer: A
Perfect Forward Secrecy (PFS), also called forward secrecy (FS), refers to an encryption system that changes the keys used to encrypt and decrypt information frequently and automatically. This ongoing process ensures that even if the most recent key is hacked, a minimal amount of sensitive data is exposed.
upvoted 10 times
...
NeoSam999
2 years, 4 months ago
Perfect forward secrecy is a feature of SSL/TLS that prevents an attacker from being able to decrypt the data from historical or future sessions if they're able to steal the private keys used in a particular session. This is achieved by using unique session keys that are freshly generated frequently and automatically.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...