CompTIACompTIA
SY0-501 · Question #30
SY0-501 Question #30: Real Exam Question with Answer & Explanation
The correct answer is C: Asymmetric. PKI (Public Key Infrastructure) relies on asymmetric encryption to securely protect and exchange keys, using a mathematically linked public/private key pair.
Submitted by lars.no· Mar 4, 2026
Question
Which of the following encryption methods does PKI typically use to securely protect keys?
Options
- AElliptic curve
- BDigital signatures
- CAsymmetric
- DObfuscation
Explanation
PKI (Public Key Infrastructure) relies on asymmetric encryption to securely protect and exchange keys, using a mathematically linked public/private key pair.
Common mistakes.
- A. Elliptic curve (ECC) is a specific mathematical algorithm used to implement asymmetric encryption, not the broader encryption method category that defines how PKI protects keys.
- B. Digital signatures are an application or use case of PKI that leverages asymmetric cryptography to verify authenticity and integrity, but they are not themselves the encryption method used to protect keys.
- D. Obfuscation is a technique that obscures data or code to make it harder to understand but provides no true cryptographic security, and it is not a recognized PKI encryption method.
Concept tested. PKI asymmetric encryption key protection method
Reference. https://learn.microsoft.com/en-us/windows/win32/seccertenroll/public-key-infrastructure
Community Discussion
No community discussion yet for this question.