Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of the following describes an asymmetric key algorithm? (select two)
Cannot be used to ensure non-repudiation
Encryption and decryption is performed using the same key
Does not require secure exchange of a secret key
Requires two separate keys
An asymmetric key algorithm requires two keys: private (which is never shared) and public (which is openly available), so no key exchange is needed for communication. Messages are encrypted with the recipient's public key and decrypted with the recipient's private key. Private keys are also used in the process of signing messages to ensure non-repudiation. Keep in mind that while a user can use their private key to hash, if someone is sending them a message, it can't be used for non-repudiation.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.