exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 102 discussion

Actual exam question from CompTIA's SY0-601
Question #: 102
Topic #: 1
[All SY0-601 Questions]

Digital signatures use asymmetric encryption. This means the message is encrypted with:

  • A. the sender's private key and decrypted with the sender's public key.
  • B. the sender's public key and decrypted with the sender's private key.
  • C. the sender's private key and decrypted with the recipient's public key.
  • D. the sender's public key and decrypted with the recipient's private key.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 7 months ago
In order to verify the authenticity of a digital signature we need to encrypt the initial message with the sender's private key. The receiver then can verify the authenticity by decrypting the message with the sender's public key. https://docs.huihoo.com/globus/gt4-tutorial/ch09s03.html
upvoted 46 times
[Removed]
1 year, 2 months ago
Thanks stoneface, I looked this up and am expanding why: as the question is dealing with digital signatures, otherwise, the answer would be 'B' if it dealt with messaging.
upvoted 2 times
...
...
Knowledge33
Highly Voted 2 years, 6 months ago
Selected Answer: A
There are 2 general ways to use asymetric algorithm. 1 - For communication between 2 hosts: If bob sends a message to Alice, bob uses Alice's public key to encrypt the message, and Alice uses her private key to decrypt the message. 2 - For digital signature/Authentication: If ALice need to authenticate Bob, BOB uses his private key to sign the message, and Alice uses the public key of bob to decrypt the message. This process help to make sure the signature is owned by Bob. On this example, A is totally correct.
upvoted 38 times
scarceanimal
2 years, 2 months ago
I NEVER KNEW THIS wow ty
upvoted 4 times
...
Xynned
1 year, 9 months ago
Didn't knew there were different usage for asymmetric cryptography in terms of mail usage. Was only aware of S/MIME which uses recipient's public key to encrypt the message and uses the recipient's private key to decrypt. Thanks for this info!
upvoted 2 times
...
...
Gigi42
Most Recent 10 months, 4 weeks ago
Selected Answer: C
C is the correct choice here. Sender encrypts with private key and the recipient has to decrypt using his own public key.
upvoted 1 times
...
Mehe323
12 months ago
Trick question. It is asking for digital signatures, not for the en- and decryption of information that is confidential. And therefore the answer is A. The recipient can use the public key to confirm the identity of the sender.
upvoted 1 times
...
bknum9
1 year, 2 months ago
Selected Answer: A
A. the sender's private key and decrypted with the sender's public key.
upvoted 1 times
...
dfc6822
1 year, 3 months ago
B Asymmetric encryption uses two different keys, a public key for encryption and a private key for decryption
upvoted 1 times
...
VEE224
1 year, 4 months ago
answer is B Asymmetric key algorithms use a public key for encryption and a private key for decryption. Examples include the RSA, Diffie-Hellman, El Gamal, and elliptic curve cryptography standards
upvoted 2 times
...
above
1 year, 6 months ago
Selected Answer: A
Digital signatures work by proving that a digital message or document was not modified—intentionally or unintentionally—from the time it was signed. Digital signatures do this by generating a unique hash of the message or document and encrypting it using the sender's private key. The hash generated is unique to the message or document, and changing any part of it will completely change the hash. Once completed, the message or digital document is digitally signed and sent to the recipient. The recipient then generates their own hash of the message or digital document and decrypts the sender's hash (included in the original message) using the sender's public key. The recipient compares the hash they generate against the sender's decrypted hash; if they match, the message or digital document has not been modified and the sender is authenticated. https://www.cisa.gov/news-events/news/understanding-digital-signatures
upvoted 2 times
...
kigikik881
1 year, 6 months ago
I didn't expect they call the process of signing "encrypt"... So stupid and misleading. Everywhere I read the process of encryption is changing of clear-text data into hiden(encrypted) ciphertext so it can't be read without decryption.
upvoted 1 times
daddylonglegs
1 year, 6 months ago
It's not stupid or misleading at all if you take care and read the question. Make sure you understand what a digital signature is.
upvoted 1 times
...
...
lamrine04
1 year, 9 months ago
Selected Answer: B
From ChatGPT: The correct answer is B. the sender's public key and decrypted with the sender's private key. In digital signatures, the message is first hashed (using a cryptographic hash function) to generate a fixed-length digest. Then, this digest is encrypted with the sender's private key to create the signature. The recipient of the message can then verify the signature by decrypting it using the sender's public key, which should result in the same hash value. If the decrypted hash matches the hash value calculated from the received message, it confirms the integrity of the message and the authenticity of the sender. So, digital signatures use asymmetric encryption in such a way that the message is encrypted with the sender's private key and decrypted with the sender's public key for verification.
upvoted 1 times
TuanDinh
1 year, 8 months ago
chat GPT sometime stupid
upvoted 12 times
Old_Boy_
1 year, 5 months ago
Chat GPT would fail this test.
upvoted 3 times
...
...
...
Protract8593
1 year, 9 months ago
Selected Answer: A
Digital signatures use asymmetric encryption, but when it comes to signing a message or file with a digital signature, the process is as follows: A. The sender's private key is used to encrypt the hash or digest of the message, and the recipient uses the sender's public key to decrypt the hash or digest and verify the authenticity of the signature. So, for digital signatures, the correct answer is A.
upvoted 2 times
...
Aleem001
1 year, 9 months ago
Selected Answer: B
Digital signatures use asymmetric encryption. This means the message is encrypted with: A. the sender's private key and decrypted with the sender's public key. Most Voted B. the sender's public key and decrypted with the sender's private key. C. the sender's private key and decrypted with the recipient's public key. D. the sender's public key and decrypted with the recipient's private key. ChatGPT B. the sender's public key and decrypted with the sender's private key.
upvoted 1 times
sirpsionics
1 year, 9 months ago
I find it sorta funny that Bard and Bing give the answer as C. Given that I am having a hard time understanding how things work, I have no clue if the answer is A, B, or C.
upvoted 1 times
daddylonglegs
1 year, 6 months ago
The answer is A. None of the other answers make sense. First of all, C and D suggest using the public and private keys of two different keypairs, which would not work at all. If you chose B, that would imply that the sender's private key was being shared with the recipient to decrypt the message, which defeats the entire purpose of asymmetric encryption. A describes the process of digital signatures. If the sender encrypts something with their private key, the message can only be decrypted with the sender's public key. Therefore, you know that the sender was the true sender, because attempting to decrypt using anyone else's key would not work. This process of digital signing would typically take place after the sender encrypts the message using the recipient's public key to protect confidentiality.
upvoted 1 times
...
...
...
ApplebeesWaiter1122
1 year, 9 months ago
Selected Answer: A
The purpose of using the sender's private key for encryption is to create a unique digital signature that can only be generated by the sender. This provides authenticity and non-repudiation, as only the sender possessing the corresponding private key can create a valid signature. The recipient can then decrypt the signature using the sender's public key to verify the integrity and authenticity of the message.
upvoted 1 times
...
Dutch012
1 year, 11 months ago
guys it's B the sender encrypts the message with your public key and you decrypt it by using your private key, your public key is shared with others, and they can not decrypt the message with your public key.
upvoted 3 times
...
RobbieT
2 years ago
The key thing here is signature. You sign with your private key.
upvoted 1 times
...
mkimchi
2 years ago
These answer choices are worded wrong. Asymmetric encryption uses two keys: public and private. Anything encrypted with the public key can only be decrypted with the matching private key. Anything encrypted with the private key can only be decrypted with the matching public key. For digital signatures, to send the message with encryption, you use the sender’s private key and decrypt the message with the sender’s public key.
upvoted 4 times
daddylonglegs
1 year, 6 months ago
...which is answer A
upvoted 1 times
...
...
MGMKING
2 years ago
asymmetric encryption Also called public key cryptography, a data encryption system that uses two mathematically derived keys to encrypt and decrypt a message—a public key, available to everyone, and a private key, available only to the owner of the key.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago