CiscoCisco
200-201 · Question #280
200-201 Question #280: Real Exam Question with Answer & Explanation
The correct answer is A: Elliptic-curve cryptography is used for the public keys.. The certificate details indicate that Elliptic-curve cryptography (ECC) is used for the public keys, providing strong cryptographic security.
Submitted by kwame.gh· Mar 6, 2026Security Concepts
Question
Refer to the exhibit. An engineer needs to identify certificate information on server1234567890. What does the exhibit indicate?
Options
- AElliptic-curve cryptography is used for the public keys.
- BKey exchange is not secure as the SHA256 hashing algorithm is used.
- CThe certificate is signed by GTS CA on May 24 and is invalid.
- DAsymmetric cryptography is used for key exchange.
Explanation
The certificate details indicate that Elliptic-curve cryptography (ECC) is used for the public keys, providing strong cryptographic security.
Common mistakes.
- B. SHA256 is a robust hashing algorithm used for the signature, and its presence does not inherently signify that key exchange is insecure; it is a standard component of secure certificate operations.
- C. The exhibit does not provide enough information to determine the certificate's validity status, only its 'Valid from' and 'Valid to' dates, and does not claim it is invalid.
- D. While Elliptic-curve cryptography is a form of asymmetric cryptography used for key exchange, option A is more specific and directly references the ECC components visible in the certificate details, making it a more precise interpretation.
Concept tested. Certificate cryptography details, ECC identification
Reference. https://learn.microsoft.com/en-us/windows/win32/seccrypto/elliptic-curve-cryptography-basics
Topics
#Cryptography#Certificates#ECC#Key exchange
Community Discussion
No community discussion yet for this question.