exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 353 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 353
Topic #: 1
[All 312-50v11 Questions]

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key.
What is the security model implemented by Jane to secure corporate messages?

  • A. Zero trust network
  • B. Secure Socket Layer (SSL)
  • C. Transport Layer Security (TLS)
  • D. Web of trust (WOT)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Daniel8660
Highly Voted 6 months, 1 week ago
Selected Answer: D
Web of Trust (WOT) Web of trust (WoT) is a trust model of PGP, OpenPGP, and GnuPG accessible systems.In WoT, everyone in the network is a CA, and they can sign for other trusted entities.WoT is a network chain in which individuals intermediately validate each other’s certificates using their signatures. Every user in the network has a ring of public keys to encrypt the data, and they introduce many other users whom they trust. (P.3096/3080)
upvoted 5 times
...
KumaraRashu
Most Recent 1 year, 2 months ago
D is correct:CEHv11 page 3096 ring of public keys
upvoted 1 times
...
Osen
1 year, 6 months ago
D correct There are two keys pertaining to a person: a public key which is shared openly and a private key that is withheld by the owner. The owner's private key will decrypt any information encrypted with its public key. In the web of trust, each user has a ring with a group of people's public keys. Users encrypt their information with the recipient's public key, and only the recipient's private key will decrypt it. Each user then digitally signs the information with their private key, so when the recipient verifies it against the user's own public key, they can confirm that it is the user in question.
upvoted 3 times
...
jinjection
1 year, 7 months ago
Correct D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago