Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 234 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 234
Topic #: 1
[All 312-50v12 Questions]

As a cybersecurity consultant for SafePath Corp, you have been tasked with implementing a system for secure email communication. The key requirement is to ensure both confidentiality and non-repudiation. While considering various encryption methods, you are inclined towards using a combination of symmetric and asymmetric cryptography. However, you are unsure which cryptographic technique would best serve the purpose. Which of the following options would you choose to meet these requirements?

  • A. Apply asymmetric encryption with RSA and use the private key for signing.
  • B. Use the Diffie-Hellman protocol for key exchange and encryption.
  • C. Apply asymmetric encryption with RSA and use the public key for encryption.
  • D. Use symmetric encryption with the AES algorithm.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
milktea810182
6 months, 1 week ago
Selected Answer: A
This option utilizes asymmetric encryption with RSA, which ensures confidentiality through encryption using the recipient's public key and utilizes the sender's private key for digital signing to achieve non-repudiation. By signing the email with the sender's private key, it ensures that the sender cannot later deny sending the message, providing a form of non-repudiation. This approach offers a robust solution for secure email communication meeting the specified requirements.
upvoted 1 times
...
qtygbapjpesdayazko
8 months ago
Selected Answer: A
Apply asymmetric encryption with RSA and use the private key for signing.
upvoted 1 times
...
brrbrr
9 months ago
Selected Answer: A
A - Apply asymmetric encryption with RSA and use the private key for signing: Asymmetric encryption with RSA is suitable for confidentiality (encryption) when combined with the public key. Using the private key for signing ensures that the sender is authentic, providing non-repudiation.
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: A
To meet the requirements of both confidentiality and non-repudiation in secure email communication, a combination of symmetric and asymmetric cryptography is commonly employed. Based on the options provided, the most suitable choice would be: A. Apply asymmetric encryption with RSA and use the private key for signing.
upvoted 1 times
...
rorahir
9 months, 2 weeks ago
Im a bit hesitant about the effectiveness of this ethical hacking approach"
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...