New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 11 Question 24 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 24
Topic #: 11
[All 212-81 Questions]

During the process of encryption and decryption, what keys are shared?

Show Suggested Answer Hide Answer
Suggested Answer: A

Public keys

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.

Alice and Bob have two keys of their own --- just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message assuming he's kept it secret, of course.

Alice and Bob do not need to plan anything ahead of time to communicate securely: they generate their public-private key pairs independently, and happily broadcast their public keys to the world at large. Alice can rest assured that only Bob can decrypt the message she sends because she has encrypted it with his public key.


Contribute your Thoughts:

0/2000 characters
Margarett
3 months ago
Wait, are we sure about that? Sounds off!
upvoted 0 times
...
Johanna
3 months ago
Nah, just public keys, right?
upvoted 0 times
...
Ronald
4 months ago
I thought private keys were shared too?
upvoted 0 times
...
Donette
4 months ago
Definitely A! Public keys only.
upvoted 0 times
...
Rolande
4 months ago
Public keys are shared during encryption.
upvoted 0 times
...
Florencia
4 months ago
I’m leaning towards public keys being the answer, but I vaguely recall something about private keys too.
upvoted 0 times
...
Merrilee
4 months ago
I feel like user passwords might come into play, but they aren't really shared in the same way as keys, right?
upvoted 0 times
...
Cheryl
5 months ago
I remember practicing a question about key exchange, and I think it mentioned both public and private keys being used.
upvoted 0 times
...
Amira
5 months ago
I think public keys are shared during encryption, but I'm not sure if that's the only key involved.
upvoted 0 times
...
Moon
5 months ago
Okay, let me review what I know about encryption. Public keys are shared, but private keys are kept private. I'll go with option B.
upvoted 0 times
...
Aracelis
5 months ago
User passwords? That doesn't seem right for encryption and decryption. I'll rule out option C.
upvoted 0 times
...
Kate
5 months ago
Public keys are shared, but private keys are kept secret, right? I think option B is the right answer.
upvoted 0 times
...
Ming
5 months ago
Hmm, I'm a bit confused on the difference between public and private keys. I'll have to think this through carefully.
upvoted 0 times
...
Ciara
5 months ago
I'm pretty sure this is about public and private keys, so I'll go with option B.
upvoted 0 times
...
Elmer
5 months ago
Alright, let's think this through step-by-step. Encryption and decryption require keys, and in public-key cryptography, the public key is shared for encryption while the private key is kept secret for decryption. So the answer has to be option B - public and private keys.
upvoted 0 times
...
Willard
5 months ago
Ugh, I'm not super confident about crypto concepts. Let me re-read the question and options carefully. I think public and private keys are involved, but I'm not 100% sure. I'll have to make an educated guess on this one.
upvoted 0 times
...
Viki
5 months ago
Easy peasy! The answer is public and private keys. That's the core of asymmetric cryptography, where the public key is used for encryption and the private key is used for decryption. Option B is the way to go.
upvoted 0 times
...
Lauran
5 months ago
Okay, let me see... I know encryption and decryption use keys, but I'm not totally sure which ones are shared. I'll have to think this through carefully and eliminate the options that don't make sense.
upvoted 0 times
...
Lura
5 months ago
Hmm, this seems like a straightforward crypto question. I'll think through the key concepts here - public and private keys are definitely involved in encryption and decryption, so I'm leaning towards option B.
upvoted 0 times
...
Tu
5 months ago
Definitely disable the validation rules and triggers. That's the best way to ensure a smooth data import without any issues. We can always re-enable them after the import is complete.
upvoted 0 times
...
Avery
5 months ago
This seems like a pretty straightforward networking question. Based on my understanding, IPTables is the standard firewall tool for the Linux 2.4 kernel, so that's the answer I'm going to go with.
upvoted 0 times
...
Selma
5 months ago
I think the key here is to focus on how the teacher will manage the use of laptops to ensure they don't become a distraction. Option D seems like the best approach.
upvoted 0 times
...
Olen
5 months ago
I'm a bit unsure here. If the asset depreciates more for tax purposes than for accounting, wouldn't that lead to a deferred tax liability?
upvoted 0 times
...

Save Cancel