PrepAway - Latest Free Exam Questions & Answers

Which of the following is used to authenticate asymmetric keys?

Which of the following is used to authenticate asymmetric keys?

PrepAway - Latest Free Exam Questions & Answers

A.
Digital signature

B.
MAC Address

C.
Demilitarized zone (DMZ)

D.
Password

Explanation:
A digital signature is used to authenticate asymmetric keys.
Digital signature is a message signed with a sender’s private key can be verified by anyone who has
access to the sender’s public key,
thereby proving that the sender signed it and that the message has not been tampered with. This is
used to ensure authenticity.
Public-key cryptography, also known as asymmetric cryptography, is a form of cryptography in
which the key used to encrypt a message
differs from the key used to decrypt it.
Answer option C is incorrect. Demilitarized zone (DMZ) or perimeter network is a small network that
lies in between the Internet and a private
network. It is the boundary between the Internet and an internal network, usually a combination of
firewalls and bastion hosts that are
gateways between inside networks and outside networks. DMZ provides a large enterprise network
or corporate network the ability to use
the Internet while still maintaining its security.

Answer options D and B are incorrect. Password and MAC address are not used to authenticate
asymmetric keys.


Leave a Reply