nerdexam
EC-CouncilEC-Council

312-50V13 · Question #435

312-50V13 Question #435: Real Exam Question with Answer & Explanation

The correct answer is D: Web of trust (WOT). Jane implemented a Web of Trust (WoT) model, where users manage a collection of trusted public keys for secure message authentication and encryption, relying on decentralized trust relationships.

Submitted by yousef_jo· Mar 6, 2026Cryptography

Question

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key. What is the security model implemented by Jane to secure corporate messages?

Options

  • AZero trust network
  • BTransport Layer Security (TLS)
  • CSecure Socket Layer (SSL)
  • DWeb of trust (WOT)

Explanation

Jane implemented a Web of Trust (WoT) model, where users manage a collection of trusted public keys for secure message authentication and encryption, relying on decentralized trust relationships.

Common mistakes.

  • A. A Zero Trust network focuses on never trusting, always verifying, regardless of location, which is a broader security architecture, not a specific key management or encryption model like described.
  • B. Transport Layer Security (TLS) is a cryptographic protocol for securing communication over a computer network, primarily using X.509 certificates and a hierarchical PKI, rather than a decentralized web of trust.
  • C. Secure Socket Layer (SSL) is the deprecated predecessor to TLS and also relies on a hierarchical PKI for certificate validation, not a web of trust for managing public keys.

Concept tested. Cryptographic Web of Trust model

Reference. https://datatracker.ietf.org/doc/html/rfc1991

Topics

#Web of trust#public key cryptography#message integrity#authentication

Community Discussion

No community discussion yet for this question.

Full 312-50V13 PracticeBrowse All 312-50V13 Questions