New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 3 Question 53 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 53
Topic #: 3
[All CPEH-001 Questions]

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob's public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob's public key and use it to verify Bob's signature, they cannot discover Bob's private key and use it to forge digital signatures. What does this principle refer to?

Show Suggested Answer Hide Answer
Suggested Answer: D

PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other.


Contribute your Thoughts:

0/2000 characters
Giuseppe
4 months ago
Yup, only Bob can decrypt with his private key!
upvoted 0 times
...
Cherilyn
4 months ago
Just to clarify, anyone can encrypt with the public key, right?
upvoted 0 times
...
Wynell
4 months ago
Wait, are we sure it's not non-repudiation?
upvoted 0 times
...
Ciara
4 months ago
Totally agree, it's definitely asymmetry.
upvoted 0 times
...
Rory
4 months ago
This is all about asymmetry in encryption!
upvoted 0 times
...
Kyoko
5 months ago
I keep mixing up these terms! I thought irreversibility was important, but now I'm leaning towards asymmetry since it deals with the public and private keys.
upvoted 0 times
...
Arleen
5 months ago
I practiced a similar question, and I think the key aspect here is that only Bob can decrypt the message, which points to asymmetry.
upvoted 0 times
...
Micah
5 months ago
I'm not entirely sure, but I feel like non-repudiation might be the right answer since it involves verifying signatures.
upvoted 0 times
...
Iluminada
5 months ago
I remember studying PKI, and I think this principle is related to how public and private keys work together. Maybe it's asymmetry?
upvoted 0 times
...
Tora
5 months ago
I'm feeling a bit lost on this one. The terminology around "Privileged Session Management" and "PSM Gateway" is not something I'm familiar with. I'll have to do some quick research on these concepts before I can confidently select an answer. Hopefully I can figure it out in time for the exam.
upvoted 0 times
...
Lai
5 months ago
Alright, I got this. The key here is that we need to remove the file from the staging area, not delete it. So the git reset HEAD devcoreg13642911.jpg command is the way to go. Confident I can get this one right.
upvoted 0 times
...
Cecil
5 months ago
I seem to remember something about Avaya Secure Access Link being the recommended tool, but I'm not completely sure.
upvoted 0 times
...
Harris
5 months ago
I'm leaning towards C. Incident Management, since that's all about responding to and resolving incidents quickly. But I'll double-check the definitions to be sure.
upvoted 0 times
...

Save Cancel