Which of the following encryption methods does PKI typically use to securely project keys?

Which of the following encryption methods does PKI typically use to securely project keys?
A. Elliptic curve
B. Digital signatures
C. Asymmetric
D. Obfuscation

How To Pass SY0-601 Exam?

CompTIA SY0-601 PDF dumps.

High quality SY0-601 pdf and software. VALID exam to help you pass.

comptia-exams

9 thoughts on “Which of the following encryption methods does PKI typically use to securely project keys?

  1. There is an error but not only in “project”

    The answer is B because it should be digital certificate.
    I’ve come to this conclusion because:

    Elliptic curve is a method to produce asymmetric keys on mobile devices.

    Digital signatures sign a message with your private key so that way anyone can use your public key and know it came from only you (authentication/integrity with hashing).

    Asymmetric algorithms use the key pair to encrypt/decrypt a message, it can not protect a key.

    Obfuscation is just wrong, “securely”

    None of these answers make sense but digital certificates do.

  2. PKI uses private key and public key Asymmetric encryption to establish a secure channel to share a symmetric key used to encrypt session data. My guess is C

  3. The question has a typo – protect instead of project. To protect means to encrypt and digital signatures are a component of integrity not protection.

    C. Asymmetric is a form of encryption.

  4. C is the correct Answer.
    It is asking for the encryption methods that PKI uses. It used asymmetric encryption to make digital certificates. Digital certificates are used to verify who you are

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.