nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #348

CERTIFIED-IN-CYBERSECURITY Question #348: Real Exam Question with Answer & Explanation

The correct answer is B: Asymmetric-key cryptography. Digital signatures primarily rely on asymmetric-key cryptography, which uses a pair of public and private keys to encrypt and decrypt data (see ISC2 Study Guide, Chapter 5, Module 1). In digital signatures, the sender's private key is used to sign the message, and the correspondi

Security Principles

Question

Digital signatures primarily rely on which cryptographic technique?

Options

  • AStream ciphers
  • BAsymmetric-key cryptography
  • CSymmetric-key cryptography
  • DHash functions

Explanation

Digital signatures primarily rely on asymmetric-key cryptography, which uses a pair of public and private keys to encrypt and decrypt data (see ISC2 Study Guide, Chapter 5, Module 1). In digital signatures, the sender's private key is used to sign the message, and the corresponding public key is used to verify the signature. With regards to the other options, symmetric-key cryptography is a type of cryptography that uses a single key to both encrypt and decrypt data and is not used for digital signatures. Hash functions generate a unique value from a given input and are not used for digital signatures. Stream ciphers encrypt data in real time and are not used for digital

Topics

#Digital Signatures#Asymmetric Cryptography#Cryptographic Principles#Information Assurance

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions