Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 14 Question 57 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 57
Topic #: 14
[All 212-81 Questions]

Terrance oversees the key escrow server for his company. All employees use asymmetric cryptography to encrypt all emails. How many keys are needed for asymmetric cryptography?

Show Suggested Answer Hide Answer
Suggested Answer: A

:

2

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.


Contribute your Thoughts:

0/2000 characters
Marsha
4 months ago
Yup, 2 keys for each user, that's how it works!
upvoted 0 times
...
Walker
4 months ago
Wait, are you sure it's just 2? Seems too simple.
upvoted 0 times
...
Joesph
4 months ago
I thought it might be more than that, like 4 or something.
upvoted 0 times
...
Blair
4 months ago
Totally agree, it's definitely 2 keys!
upvoted 0 times
...
Kimberlie
5 months ago
Asymmetric cryptography needs 2 keys, a public and a private one.
upvoted 0 times
...
Irene
5 months ago
I feel like there might be more keys involved, but I can’t recall any specific examples that suggest that.
upvoted 0 times
...
Alita
5 months ago
I practiced a similar question, and I believe it’s definitely two keys, but I’m worried I might be overthinking it.
upvoted 0 times
...
Felton
5 months ago
I’m not entirely sure, but I remember something about needing one public and one private key for each user.
upvoted 0 times
...
Buddy
5 months ago
I think asymmetric cryptography uses a pair of keys, so I’m leaning towards option A.
upvoted 0 times
...
Frederic
6 months ago
I remember learning that asymmetric cryptography uses a public key and a private key for each user, so the total number of keys needed would be 3 or more. I'll select option C.
upvoted 0 times
...
Wilda
6 months ago
Okay, I know asymmetric cryptography uses a public key and a private key, so that's 2 keys. But the question says "all employees" use it, so maybe there are more keys involved. I'll go with option B to be safe.
upvoted 0 times
...
Patti
6 months ago
Hmm, I'm a bit confused on this one. I thought asymmetric cryptography used more than 2 keys, but I can't remember the exact number. I'll have to think this through carefully.
upvoted 0 times
...
Claudia
6 months ago
I'm pretty sure it's 2 keys for asymmetric cryptography, so I'll go with option A.
upvoted 0 times
...
Osvaldo
9 months ago
Clearly, the answer is 2 keys. Unless Terrance is secretly a wizard, in which case it's definitely 4 keys.
upvoted 0 times
Dick
8 months ago
B) 4
upvoted 0 times
...
Paulina
8 months ago
A) 2
upvoted 0 times
...
Twanna
8 months ago
B) 4
upvoted 0 times
...
Ilene
8 months ago
A) 2
upvoted 0 times
...
...
Carman
9 months ago
I'm feeling lucky, let's go with 1 key. That's all you need, right? Just one master key to rule them all!
upvoted 0 times
Timmy
7 months ago
That's too many keys, you only need 2 for asymmetric cryptography.
upvoted 0 times
...
Miriam
8 months ago
B) 4
upvoted 0 times
...
Huey
8 months ago
No, you actually need 2 keys for asymmetric cryptography.
upvoted 0 times
...
Brent
8 months ago
A) 2
upvoted 0 times
...
...
Lachelle
9 months ago
Wait, isn't it 3 keys? One for encryption, one for decryption, and one for the secret handshake?
upvoted 0 times
Malika
8 months ago
A) 2
upvoted 0 times
...
Rosio
8 months ago
C) 3
upvoted 0 times
...
Taryn
8 months ago
A) 2
upvoted 0 times
...
...
Hyman
9 months ago
I'm not sure. I think it might be C) 3 because there's also a third key involved in the process.
upvoted 0 times
...
Francene
10 months ago
Hmm, I'm gonna go with 4 keys. Gotta have one for each element, you know? Fire, earth, air, and water!
upvoted 0 times
Annett
9 months ago
User 2
upvoted 0 times
...
Andra
9 months ago
User 1
upvoted 0 times
...
...
Twana
10 months ago
I agree with Sharita. With asymmetric cryptography, you need 2 keys - a public key and a private key.
upvoted 0 times
...
Sharita
10 months ago
I think the answer is A) 2.
upvoted 0 times
...
Stanford
10 months ago
Easy peasy, it's 2 keys! One public and one private. Duh!
upvoted 0 times
Mitzie
8 months ago
No, it's actually 2 keys for asymmetric cryptography
upvoted 0 times
...
Colette
8 months ago
B) 4
upvoted 0 times
...
Glenn
8 months ago
Exactly! One public and one private
upvoted 0 times
...
Buffy
9 months ago
B) 4
upvoted 0 times
...
Elroy
9 months ago
Exactly! One public and one private key
upvoted 0 times
...
German
9 months ago
A) 2 keys
upvoted 0 times
...
Florinda
9 months ago
A) 2 keys
upvoted 0 times
...
...

Save Cancel