- Home
- Networking
- CCNA Security
66.
What minimum key length is recommended when implementing asymmetric encryption?
- A.768
- B.1024
- C.2048
- D.4096
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
2048 should be the minimum key length used. 1024 is considered too weak for computing power today. |
67.
Who has possession of the private key?
- A.Everyone
- B.Generator of the certificate
- C.CA
- D.Requestor of the certificate
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
The requestor is ultimately the holder of the private key. A CA does have a private key but would have to request it. |
68.
What are the drawbacks of asymmetric encryption? (Choose two.)
- A.Speed
- B.Key length weakness
- C.Expense
- D.Lack of use
- Answer & Explanation
- Report
Answer : [A, B]
Explanation :
Explanation :
The two main drawbacks to asymmetric encryption are the slowness to compute and the weakness in the key length compared to symmetric encryption. |
69.
What is the main use for asymmetric encryption?
- A.Encrypting large amounts of data
- B.Generating shared secret keys
- C.Encrypting images
- D.VPN data
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Because of its speed, asymmetric encryption is used for small amounts of data for short periods of time. Generating a shared secret key for symmetric encryption is the main use. |
70.
Who and what possess the public key?
- A.Digital certificate
- B.Holder of the private key
- C.Anyone who requests it
- D.All of the above
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
The public key is part of the digital certificate. The holder of the private key also knows the public key, and anyone who requests a certificate is provided with the public key. |