Question

1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

1.Which of the following statements about asymmetric-key encryption is correct?

a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties.

b Employees in the same company share the same public key.

c Most companies would like to manage the private keys for their employees.

d Most companies would like to use a Certificate Authority to manage the public keys of their employees.

e Two of the above are correct.

2 Which of the following controls would most likely assure that a company can reconstruct its financial records?

  • Security controls such as firewalls

  • Backup data are tested and stored safely

  • Personnel understand the data very well

  • Paper records

3.Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?

  • A message digest.

  • A 16-bit encryption key.

  • A public key and a private key.

  • A digital signature.

4.Which of the following is not one of the main components of vulnerability management and assessment?

  • Identification.

  • Remediation.

  • Internalization.

  • Maintenance.

5.A Public Key Infrastructure (PKI) provides the ability to do which of the following?

  • Encrypt messages using a private key.

  • Enable debit and credit card transactions.

  • Read plaintext.

  • Issue, maintain, and revoke digital certificates.

6.Which of the following statements is incorrect about digital signatures?

  • A digital signature can ensure data integrity.

  • A digital signature also authenticates the document creator.

  • A digital signature is an encrypted message digest.

  • A digital signature is a message digest encrypted using the document creator's public key.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Asymmetric keys are the foundation of Public Key Infrastructure (PKI) a cryptographic scheme requiring two different keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One key is published (public key) and the other is kept private (private key). If the lock/encryption key is the one published, the system enables private communication from the public to the unlocking key's owner. If the unlock/decryption key is the one published, then the system serves as a signature verifier of documents locked by the owner of the private key. This system also is called asymmetric key cryptography.

1.Which of the following statements about asymmetric-key encryption is correct?

a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties.

2 Which of the following controls would most likely assure that a company can reconstruct its financial records?

Backup data are tested and stored safely

Add a comment
Know the answer?
Add Answer to:
1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT