exam questions

Exam 312-50v10 All Questions

View all questions & answers for the 312-50v10 exam

Exam 312-50v10 topic 1 question 151 discussion

Actual exam question from ECCouncil's 312-50v10
Question #: 151
Topic #: 1
[All 312-50v10 Questions]

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentially, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Basic example to understand how cryptography works is given below:

Which of the following choices true about cryptography?

  • A. Algorithm is not the secret; key is the secret.
  • B. Public-key cryptography, also known as asymmetric cryptography, public key is for decrypt, private key is for encrypt.
  • C. Secure Sockets Layer (SSL) use the asymmetric encryption both (public/private key pair) to deliver the shared session key and to achieve a communication way.
  • D. Symmetric-key algorithms are a class of algorithms for cryptography that use the different cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Terencemak
1 year, 2 months ago
private key is secret, public key is not.
upvoted 4 times
...
Gibby_Toni
1 year, 2 months ago
Actually, in the exam, such a question you will be asked to choose the answers that are true...so for this case, A,B, and C are true.
upvoted 1 times
Anonymousnumber1
1 year, 2 months ago
B is not true because public key for encrypt and private key for decrypt
upvoted 6 times
bleble00001
1 year, 1 month ago
Well, that's not entirely true. In asymmetric key cryptography, you can encrypt with any key, and you need the other to decrypt.
upvoted 3 times
datastream
10 months, 2 weeks ago
Going by the official CEH book.... "Asymmetric encryption uses the following sequence to send a message: 1. An individual finds the public key of the person he or she wants to contact in a directory. 2. This public key is used to encrypt a message that is then sent to the intended recipient. 3. The receiver uses the private key to decrypt the message and reads it. No one but the holder of the private key can decrypt a message composed with the corresponding public key. This increases the security of the information because all communications involve only public keys; the message sender never transmits or shares the private keys. The sender must link the public keys with the usernames in a secured method to ensure that individuals claiming to be the intended recipient do not intercept information. To meet the need for authentication, one can use digital signatures."
upvoted 1 times
...
...
...
...
Dazzy
1 year, 3 months ago
It appears A is correct as well.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago