New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 1 Question 4 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 4
Topic #: 1
[All 212-81 Questions]

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

Show Suggested Answer Hide Answer
Suggested Answer: A

PKI

https://en.wikipedia.org/wiki/Public_key_infrastructure

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

Incorrect answers:

PIKE -stream cipher was invented by Ross Anderson to be a 'leaner and meaner' version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.

GOST-hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined in the Russian national standard GOST R 34.11-94 Information Technology -- Cryptographic Information Security -- Hash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95.

CA -certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party---trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.


Contribute your Thoughts:

0/2000 characters
Rosina
4 months ago
Totally agree, PKI is the way to go!
upvoted 0 times
...
Brandon
4 months ago
Wait, is GOST really a thing?
upvoted 0 times
...
Cory
4 months ago
PKI uses asymmetric keys, right?
upvoted 0 times
...
Leah
4 months ago
I thought it was CA?
upvoted 0 times
...
Kimbery
4 months ago
That's definitely PKI!
upvoted 0 times
...
Farrah
5 months ago
I practiced a question similar to this, and I think PKI is definitely the right answer since it covers the use of asymmetric keys and security services.
upvoted 0 times
...
Toi
5 months ago
CA sounds familiar, but I feel like it's more about the actual certificate authorities rather than the whole network aspect mentioned here.
upvoted 0 times
...
Georgeanna
5 months ago
I'm not entirely sure, but I remember something about GOST being related to encryption standards in Russia.
upvoted 0 times
...
Raymon
5 months ago
I think this is about PKI, right? It involves public key infrastructure and certificate authorities.
upvoted 0 times
...
Alease
5 months ago
Hmm, I'm not totally sure about this one. I know listening to the customer is important, but I'm not sure if that's the "best practice." Maybe it's about using the CRM system to guide the call?
upvoted 0 times
...
Donette
5 months ago
Okay, let's see here. I know a physical port has three associated buffer pools, so I need to find the option that lists three relevant buffer pools. I'm leaning towards B or E, but I'll double-check the definitions of each pool to be sure.
upvoted 0 times
...

Save Cancel