nerdexam
CompTIACompTIA

SY0-501 · Question #30

SY0-501 Question #30: Real Exam Question with Answer & Explanation

The correct answer is C: Asymmetric. PKI (Public Key Infrastructure) relies on asymmetric encryption to securely protect and exchange keys, using a mathematically linked public/private key pair.

Submitted by lars.no· Mar 4, 2026

Question

Which of the following encryption methods does PKI typically use to securely protect keys?

Options

  • AElliptic curve
  • BDigital signatures
  • CAsymmetric
  • DObfuscation

Explanation

PKI (Public Key Infrastructure) relies on asymmetric encryption to securely protect and exchange keys, using a mathematically linked public/private key pair.

Common mistakes.

  • A. Elliptic curve (ECC) is a specific mathematical algorithm used to implement asymmetric encryption, not the broader encryption method category that defines how PKI protects keys.
  • B. Digital signatures are an application or use case of PKI that leverages asymmetric cryptography to verify authenticity and integrity, but they are not themselves the encryption method used to protect keys.
  • D. Obfuscation is a technique that obscures data or code to make it harder to understand but provides no true cryptographic security, and it is not a recognized PKI encryption method.

Concept tested. PKI asymmetric encryption key protection method

Reference. https://learn.microsoft.com/en-us/windows/win32/seccertenroll/public-key-infrastructure

Community Discussion

No community discussion yet for this question.

Full SY0-501 PracticeBrowse All SY0-501 Questions