Home
66.
What minimum key length is recommended when implementing asymmetric encryption?
  • A.
    768
  • B.
    1024
  • C.
    2048
  • D.
    4096
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
2048 should be the minimum key length used. 1024 is considered too weak for computing power today.
Report
Name Email  
67.
Who has possession of the private key?
  • A.
    Everyone
  • B.
    Generator of the certificate
  • C.
    CA
  • D.
    Requestor of the certificate
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The requestor is ultimately the holder of the private key. A CA does have a private key but would have to request it.
Report
Name Email  
68.
What are the drawbacks of asymmetric encryption? (Choose two.)
  • A.
    Speed
  • B.
    Key length weakness
  • C.
    Expense
  • D.
    Lack of use
  • Answer & Explanation
  • Report
Answer : [A, B]
Explanation :
The two main drawbacks to asymmetric encryption are the slowness to compute and the weakness in the key length compared to symmetric encryption.
Report
Name Email  
69.
What is the main use for asymmetric encryption?
  • A.
    Encrypting large amounts of data
  • B.
    Generating shared secret keys
  • C.
    Encrypting images
  • D.
    VPN data
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Because of its speed, asymmetric encryption is used for small amounts of data for short periods of time. Generating a shared secret key for symmetric encryption is the main use.
Report
Name Email  
70.
Who and what possess the public key?
  • A.
    Digital certificate
  • B.
    Holder of the private key
  • C.
    Anyone who requests it
  • D.
    All of the above
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The public key is part of the digital certificate. The holder of the private key also knows the public key, and anyone who requests a certificate is provided with the public key.
Report
Name Email