Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 53 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 53
Topic #: 3
[All CPEH-001 Questions]

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob's public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob's public key and use it to verify Bob's signature, they cannot discover Bob's private key and use it to forge digital signatures. What does this principle refer to?

Show Suggested Answer Hide Answer
Suggested Answer: D

PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel