nerdexam
(ISC)2(ISC)2

CISSP · Question #694

CISSP Question #694: Real Exam Question with Answer & Explanation

The correct answer is A: Key distribution. The primary security challenge with encrypted email is securely distributing and managing the cryptographic keys used to encrypt and decrypt messages. Without a reliable key distribution mechanism, recipients cannot decrypt messages and keys can be intercepted or mismanaged.

Submitted by minji_kr· Mar 5, 2026Security Architecture and Engineering

Question

Which of the following is considered the PRIMARY security issue associated with encrypted e- mail messages?

Options

  • AKey distribution
  • BStoring attachments in centralized repositories
  • CScanning for viruses and other malware
  • DGreater costs associated for backups and restores

Explanation

The primary security challenge with encrypted email is securely distributing and managing the cryptographic keys used to encrypt and decrypt messages. Without a reliable key distribution mechanism, recipients cannot decrypt messages and keys can be intercepted or mismanaged.

Common mistakes.

  • B. Storing attachments in centralized repositories is an operational or data management concern, not a primary security issue specific to encrypted email encryption itself.
  • C. While scanning encrypted messages for malware is a practical challenge (since encryption prevents gateway scanning), this is a secondary operational issue rather than the primary security concern inherent to email encryption design.
  • D. Greater costs for backups and restores is a financial and administrative consideration unrelated to the core security properties or vulnerabilities of encrypted email systems.

Concept tested. Primary security challenge of encrypted email key management

Reference. https://learn.microsoft.com/en-us/microsoft-365/compliance/email-encryption?view=o365-worldwide

Topics

#email encryption#key management#key distribution#cryptography

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions