PrepAway - Latest Free Exam Questions & Answers

What is the companys risk if they operate in this manner?

The consultants at Smith Consultants Inc. work on laptops that are protected by asymmetrical cryptography. To keep the management of the keys cheap, all consultants use the same key pair. What is the companys risk if they operate in this manner?

PrepAway - Latest Free Exam Questions & Answers

A.
If the private key becomes known all laptops must be supplied with new keys.

B.
If the Public Key Infrastructure (PKI) becomes known all laptops must be supplied with new keys.

C.
If the public key becomes known all laptops must be supplied with new keys.

Explanation:
An asymmetrical system solves the vulnerability involved in sharing a secret key. The characteristic of an asymmetrical system is that different keys are used for encrypting and for decrypting.
Using this method, the private key is responsible for the encryption and only the public key of this key pair can decrypt the message. What makes this system so special is that the public key can be known to the whole world, as long as the private key is kept secret.


Leave a Reply