CERTIFIED-IN-CYBERSECURITY · Question #348
CERTIFIED-IN-CYBERSECURITY Question #348: Real Exam Question with Answer & Explanation
The correct answer is B: Asymmetric-key cryptography. Digital signatures primarily rely on asymmetric-key cryptography, which uses a pair of public and private keys to encrypt and decrypt data (see ISC2 Study Guide, Chapter 5, Module 1). In digital signatures, the sender's private key is used to sign the message, and the correspondi
Question
Digital signatures primarily rely on which cryptographic technique?
Options
- AStream ciphers
- BAsymmetric-key cryptography
- CSymmetric-key cryptography
- DHash functions
Explanation
Digital signatures primarily rely on asymmetric-key cryptography, which uses a pair of public and private keys to encrypt and decrypt data (see ISC2 Study Guide, Chapter 5, Module 1). In digital signatures, the sender's private key is used to sign the message, and the corresponding public key is used to verify the signature. With regards to the other options, symmetric-key cryptography is a type of cryptography that uses a single key to both encrypt and decrypt data and is not used for digital signatures. Hash functions generate a unique value from a given input and are not used for digital signatures. Stream ciphers encrypt data in real time and are not used for digital
Topics
Community Discussion
No community discussion yet for this question.