exam questions

Exam Cybersecurity Fundamentals Specialist All Questions

View all questions & answers for the Cybersecurity Fundamentals Specialist exam

Exam Cybersecurity Fundamentals Specialist topic 1 question 42 discussion

Actual exam question from ISA's Cybersecurity Fundamentals Specialist
Question #: 42
Topic #: 1
[All Cybersecurity Fundamentals Specialist Questions]

Which type of cryptographic algorithms requires more than one key?

  • A. Block ciphers
  • B. Stream ciphers
  • C. Symmetric (private) key
  • D. Asymmetric (public) key
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Morax1100
4 days ago
Selected Answer: D
Asymmetric cryptographic algorithms (also known as public-key cryptography) require two keys: 1. Public key: Used to encrypt the data. 2. Private key: Used to decrypt the data.
upvoted 1 times
...
ac873d6
3 months ago
Selected Answer: D
Asymmetric Key Cryptography Asymmetric cryptography uses pairs of keys – a private one kept secret and a public one shared openly. You can use someone’s public key to encrypt a message, and only they can decrypt it with their private key.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago