exam questions

Exam SSCP All Questions

View all questions & answers for the SSCP exam

Exam SSCP topic 5 question 8 discussion

Actual exam question from ISC's SSCP
Question #: 8
Topic #: 5
[All SSCP Questions]

Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?

  • A. Use of public key encryption to secure a secret key, and message encryption using the secret key.
  • B. Use of the recipient's public key for encryption and decryption based on the recipient's private key.
  • C. Use of software encryption assisted by a hardware encryption accelerator.
  • D. Use of elliptic curve encryption.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
A Public Key is also known as an asymmetric algorithm and the use of a secret key would be a symmetric algorithm.
The following answers are incorrect:
Use of the recipient's public key for encryption and decryption based on the recipient's private key. Is incorrect this would be known as an asymmetric algorithm.
Use of software encryption assisted by a hardware encryption accelerator. This is incorrect, it is a distractor.
Use of Elliptic Curve Encryption. Is incorrect this would use an asymmetric algorithm.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Stevovo123
6 months, 1 week ago
Selected Answer: A
Hybrid encryption methods involve using a combination of both public key (asymmetric) encryption and symmetric encryption. In this approach, a secret key is generated for symmetric encryption, and public key encryption is used to securely transmit or exchange this secret key. Once the secret key is securely shared, it is used for encrypting and decrypting the actual message, which is much more efficient in terms of computational resources and speed compared to asymmetric encryption for encrypting the entire message.
upvoted 2 times
...
bradseth
1 year, 3 months ago
Selected Answer: B
isnt this B?
upvoted 1 times
mejt
1 year, 2 months ago
Because large quantities of sensitive information must be passed, the use of Asymmetric keys will make the process too slow. As such, the use of Asymmetric keys to pass the secret key will be a better solution, then use the symmetric keys to pass the large quantities of information.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago