nerdexam
(ISC)2(ISC)2

CISSP · Question #1472

CISSP Question #1472: Real Exam Question with Answer & Explanation

The correct answer is B: Secure Sockets Layer (SSL). SSL/TLS uses asymmetric cryptography (public/private key pairs) during the handshake to authenticate and exchange session keys, making it the primary protocol fundamentally built on public-key infrastructure.

Submitted by lukas.cz· Mar 5, 2026Security Architecture and Engineering

Question

The use of private and public encryption keys is fundamental in the implementation of which of the following?

Options

  • ADiffie-Hellman algorithm
  • BSecure Sockets Layer (SSL)
  • CAdvanced Encryption Standard (AES)
  • DMessage Digest 5 (MD5)

Explanation

SSL/TLS uses asymmetric cryptography (public/private key pairs) during the handshake to authenticate and exchange session keys, making it the primary protocol fundamentally built on public-key infrastructure.

Common mistakes.

  • A. The Diffie-Hellman algorithm is a key-exchange method that allows two parties to derive a shared secret over an insecure channel using mathematical exponentiation, but it does not itself use pre-existing private/public key pairs in the same PKI sense - it generates ephemeral values rather than relying on asymmetric encryption keys.
  • C. AES (Advanced Encryption Standard) is a symmetric encryption algorithm, meaning it uses a single shared secret key for both encryption and decryption, with no concept of separate public and private keys.
  • D. MD5 (Message Digest 5) is a cryptographic hash function that produces a fixed-length digest from input data; it does not use encryption keys of any kind - public or private - as it is a one-way hashing algorithm, not an encryption scheme.

Concept tested. Asymmetric public/private key cryptography in SSL

Reference. https://learn.microsoft.com/en-us/windows-server/security/tls/tls-ssl-schannel-ssp-overview

Topics

#Asymmetric encryption#Public key infrastructure#SSL/TLS#Cryptography

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions