exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 91 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 91
Topic #: 1
[All 312-50v11 Questions]

PGP, SSL, and IKE are all examples of which type of cryptography?

  • A. Digest
  • B. Secret Key
  • C. Public Key
  • D. Hash Algorithm
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Average_Joe
Highly Voted 8 months, 2 weeks ago
Easy way to remember between Asymmetric and Symmetric: All alternatives of Symmetric start with the same letter S: Symmetric, Secret Key, Single Key, Shared Key, or Same key (used for encrypt & decrypt). Also, symmetric cryptography are Speedy when compared to asymmetric.
upvoted 19 times
...
Mao3Wang
Most Recent 1 week, 5 days ago
Selected Answer: C
Diffie-Hellman (DH) is that part of the IKE protocol used for exchanging the material from which the symmetrical keys are built. The Diffie-Hellman algorithm builds an encryption key known as a "shared secret" from the private key of one party and the public key of the other. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/IPsec-and-IKE.htm
upvoted 1 times
...
Mao3Wang
1 week, 5 days ago
Selected Answer: C
SSL uses both asymmetric and symmetric authentication mechanisms. Public-key encryption verifies the identities of the server, the client, or both. Page 3066.
upvoted 1 times
...
Mao3Wang
1 week, 6 days ago
Selected Answer: C
PGP combines the best features of both conventional (around 1,000 times faster than public-key encryption) and public-key cryptography (solution to key distribution and data transmission issues), and is therefore known as a hybrid cryptosystem. (Page 3074)
upvoted 1 times
...
Daniel8660
2 months, 1 week ago
Selected Answer: C
Types of Cryptography Asymmetric Encryption Asymmetric encryption (public-key) uses different encryption keys, which are called public and private keys for encryption and decryption, respectively. (P.3018/3002)
upvoted 2 times
...
AleksVAnd
9 months, 2 weeks ago
I thought the question is a bit misleading as the type is asymmetric. But after a web search I see that it is also called public-key.
upvoted 2 times
...
ANDRESCB1988
1 year, 5 months ago
correct
upvoted 2 times
marcoatv
4 months ago
Of course you are correct, as always
upvoted 7 times
MyName7
4 months ago
oh my God, can't stop laughing at your 3rd comment, you're great
upvoted 5 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago