nerdexam
CiscoCisco

200-201 · Question #280

200-201 Question #280: Real Exam Question with Answer & Explanation

The correct answer is A: Elliptic-curve cryptography is used for the public keys.. The certificate details indicate that Elliptic-curve cryptography (ECC) is used for the public keys, providing strong cryptographic security.

Submitted by kwame.gh· Mar 6, 2026Security Concepts

Question

Refer to the exhibit. An engineer needs to identify certificate information on server1234567890. What does the exhibit indicate?

Options

  • AElliptic-curve cryptography is used for the public keys.
  • BKey exchange is not secure as the SHA256 hashing algorithm is used.
  • CThe certificate is signed by GTS CA on May 24 and is invalid.
  • DAsymmetric cryptography is used for key exchange.

Explanation

The certificate details indicate that Elliptic-curve cryptography (ECC) is used for the public keys, providing strong cryptographic security.

Common mistakes.

  • B. SHA256 is a robust hashing algorithm used for the signature, and its presence does not inherently signify that key exchange is insecure; it is a standard component of secure certificate operations.
  • C. The exhibit does not provide enough information to determine the certificate's validity status, only its 'Valid from' and 'Valid to' dates, and does not claim it is invalid.
  • D. While Elliptic-curve cryptography is a form of asymmetric cryptography used for key exchange, option A is more specific and directly references the ECC components visible in the certificate details, making it a more precise interpretation.

Concept tested. Certificate cryptography details, ECC identification

Reference. https://learn.microsoft.com/en-us/windows/win32/seccrypto/elliptic-curve-cryptography-basics

Topics

#Cryptography#Certificates#ECC#Key exchange

Community Discussion

No community discussion yet for this question.

Full 200-201 PracticeBrowse All 200-201 Questions