Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 53 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 53
Topic #: 1
[All 312-50v11 Questions]

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

  • A. Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
  • B. Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
  • C. Symmetric encryption allows the server to security transmit the session keys out-of-band.
  • D. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
MeganONO
Highly Voted 3 years, 9 months ago
I would say : D. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
upvoted 40 times
...
rafp6
Highly Voted 3 years, 9 months ago
D . Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
upvoted 7 times
Silascarter
3 years ago
Your Option "D" is different from what you typed. Misleading. And are some phones not more powerful than some PCs? We have phones that are 8GB RAM/1 TB 6Ghz Windows Core i5.
upvoted 1 times
uday1985
2 years, 5 months ago
CEH probably talking about Samsung Note 1 or even iPhone 3s... its technically right since their material is outdated
upvoted 2 times
...
...
...
JohnRay
Most Recent 1 month, 3 weeks ago
Selected Answer: D
The answer is D
upvoted 1 times
...
alodha100
8 months, 2 weeks ago
D is the correct answer.
upvoted 1 times
...
sistani
11 months, 1 week ago
Selected Answer: D
it is D
upvoted 1 times
...
DataTraveler
1 year, 1 month ago
Selected Answer: D
[TLS] uses a symmetric key for bulk encryption, an asymmetric key for authentication and key exchange, and message authentication codes for message integrity Appendix A, p.3273/3257
upvoted 1 times
...
ostorgaf
1 year, 3 months ago
Selected Answer: D
One of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS is that asymmetric cryptography is used for secure key exchange and authentication, while symmetric cryptography is used for data encryption and decryption. Asymmetric cryptography is computationally expensive, so using it only for the initial key exchange and then switching to faster symmetric cryptography for actual data encryption provides a balance between security and performance. This approach allows secure negotiation of session keys, which are then used for symmetric encryption, which is faster and more efficient for data transmission.
upvoted 1 times
...
TRDRPR
1 year, 4 months ago
Why is the answer 'A' and not 'D'?
upvoted 1 times
...
yasso2023
1 year, 7 months ago
Selected Answer: D
D. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
upvoted 1 times
...
nuomi
1 year, 7 months ago
D. Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
upvoted 1 times
...
qovert
1 year, 8 months ago
Answer: D In SSL/TLS, asymmetric cryptography is used during the initial handshake to securely exchange and negotiate session keys. Once the keys have been exchanged, symmetric cryptography is used for encrypting the data transmitted between the client and server. Symmetric encryption is more efficient and faster than asymmetric encryption, making it more suitable for bulk data encryption during the communication session.
upvoted 1 times
...
sphenixfire
1 year, 10 months ago
Selected Answer: D
Is correct
upvoted 1 times
...
josevirtual
1 year, 11 months ago
Selected Answer: D
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
upvoted 1 times
...
salei
1 year, 11 months ago
Selected Answer: D
Seems the most appropriate
upvoted 1 times
...
AshGreenway
1 year, 11 months ago
Selected Answer: D
D, gives benefits for both high and low computing power machines.
upvoted 1 times
...
Dar87
2 years ago
Selected Answer: D
Asymmetric Cryptography is typically used to transmit Symmetric keys due to the high resource cost associated with Asymmetric. No current devices fails between either.
upvoted 1 times
...
Dar87
2 years ago
Selected Answer: D
Asymmetric Cryptography is typically used to transmit Symmetric keys due to the high resource cost associated with Asymmetric. No current devices fails between either.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...