Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 45 discussion

Actual exam question from Isaca's CISA
Question #: 45
Topic #: 1
[All CISA Questions]

On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?

  • A. Send a certificate that can be verified by a certification authority with the public key.
  • B. Encrypt the message containing the sender's public key, using the recipient's public key.
  • C. Send the public key to the recipient prior to establishing the connection.
  • D. Encrypt the message containing the sender's public key, using a private-key cryptosystem.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Pumeza
1 week, 1 day ago
A. Send a certificate that can be verified by a certification authority with the public key.
upvoted 1 times
...
Swallows
4 months ago
Selected Answer: A
Option B does not verify the authenticity of the sender's public key, leaving the risk that someone using a forged key could send a message, thus requiring the use of certificates from a Certification Authority.
upvoted 1 times
...
a84n
6 months, 3 weeks ago
Selected Answer: A
Answer: A
upvoted 1 times
...
5b56aae
7 months ago
Selected Answer: B
only the recipient could decrypt the message and get the sender's public key. Using the sender's public key, the recipient can reply the message under the same mechnism.
upvoted 1 times
...
lsiau76
1 year, 2 months ago
Selected Answer: A
A. Send a certificate that can be verified by a certification authority with the public key. Sending a certificate that can be verified by a certification authority with the public key would be the best approach to prevent one person from using a fictitious key to impersonate someone else in a public-key cryptosystem. Certificates are used to bind a public key to a specific entity, and a certification authority's verification helps ensure the authenticity of the key. This approach establishes trust and prevents unauthorized individuals from using fake keys to impersonate legitimate parties.
upvoted 2 times
...
abeedfarooqui86
1 year, 4 months ago
Answer: A Since there is no previous connection, the initial link must be established via CA.
upvoted 3 times
...
Changwha
1 year, 4 months ago
A, Sending a certificate that can be verified by a certification authority (CA) with the public key helps establish trust and authenticity.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...