PrepAway - Latest Free Exam Questions & Answers

Which of the following encryption methods does PKI typi…

Which of the following encryption methods does PKI typically use to securely project keys?

PrepAway - Latest Free Exam Questions & Answers

A.
Elliptic curve

B.
Digital signatures

C.
Asymmetric

D.
Obfuscation

PrepAway - Latest Free Exam Questions & Answers

10 Comments on “Which of the following encryption methods does PKI typi…

    1. JayWalkerIT says:

      Most I’ve seen are wrong but the value is in thinking about each one and why it is right or wrong. Some of them are terribly worded and you will see people who understand the subject disagree with the answers and with each other. Bad questions like those will be on the test too, if my experience in A+ and Network+ is any indication. You need to understand the material and make the best guess you can sometimes. Even if a question doesn’t quite make sense, sometimes you can narrow it down to 2 possible answers and still have a 50/50 chance of guessing what the test wants.




      0



      0
  1. meac says:

    Are (B) Digital signatures deemed to be an “encryption method?”
    Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. … The private key is then used to encrypt the hash. The encrypted hash — along with other information, such as the hashing algorithm — is the digital signature. By having two keys, then this falls squarely on the grounds of :”C.Asymmetric”




    4



    0

Leave a Reply