New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CDPSE Exam - Topic 10 Question 55 Discussion

Actual exam question for Isaca's CDPSE exam
Question #: 55
Topic #: 10
[All CDPSE Questions]

Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?

Show Suggested Answer Hide Answer
Suggested Answer: C

Asymmetric encryption, also known as public-key encryption, encrypts and decrypts data using two separate yet mathematically connected cryptographic keys. One key is called the public key and can be shared with anyone, while the other key is called the private key and must be kept secret. The public key is used to encrypt the data, and only the corresponding private key can decrypt it. Likewise, the private key can be used to sign the data, and only the corresponding public key can verify it. This method provides confidentiality, integrity, authentication and non-repudiation for data.


Contribute your Thoughts:

0/2000 characters
Leah
3 months ago
I thought it was symmetric at first, but C makes sense!
upvoted 0 times
...
Tricia
3 months ago
Nope, it's not B, that's for private key encryption.
upvoted 0 times
...
Marguerita
3 months ago
Wait, is it really just two keys? Sounds too simple.
upvoted 0 times
...
King
4 months ago
Agreed, two keys are the key!
upvoted 0 times
...
Lisbeth
4 months ago
It's definitely C, Asymmetric encryption!
upvoted 0 times
...
Nelida
4 months ago
Hashing doesn’t use keys at all, so it can’t be the answer. I’m leaning towards C as well.
upvoted 0 times
...
Rolland
4 months ago
I’m a bit confused; I thought private key was also about two keys, but maybe that’s not the right term here?
upvoted 0 times
...
Stephen
4 months ago
I remember studying about symmetric and asymmetric encryption, and I think asymmetric is the one with two keys.
upvoted 0 times
...
Bettina
5 months ago
I think the answer might be C, Asymmetric, because it uses two keys, right? But I'm not completely sure.
upvoted 0 times
...
Coral
5 months ago
I'm not totally confident, but I think the answer is C. Asymmetric encryption uses two different keys, which seems to match the description in the question.
upvoted 0 times
...
Bok
5 months ago
Okay, I've got this. Asymmetric encryption uses two separate keys - a public key for encrypting and a private key for decrypting. That's the method that fits the description in the question.
upvoted 0 times
...
Laurene
5 months ago
Hmm, I'm a bit confused on the difference between symmetric and asymmetric encryption. I'll need to review those concepts before answering this.
upvoted 0 times
...
Antonio
5 months ago
I'm pretty sure this is asking about asymmetric encryption, where you have a public and private key. Let me think this through...
upvoted 0 times
...
Myong
5 months ago
I'm a bit unsure about the best approach. Didn't we discuss the importance of verifying message integrity in class? Maybe the Data Origin Authentication pattern would fit here?
upvoted 0 times
...
Lynelle
1 year ago
Ah, the age-old battle between symmetric and asymmetric encryption. It's like choosing between a handshake and a fist bump – both get the job done, but one's just more fun.
upvoted 0 times
Audry
1 year ago
I like the idea of using two separate keys for encryption, it adds an extra layer of security.
upvoted 0 times
...
Jeannine
1 year ago
Symmetric encryption is like sharing the same key to unlock a treasure chest, simple and effective.
upvoted 0 times
...
Kate
1 year ago
I prefer asymmetric encryption, it's like a secret code only certain people can crack.
upvoted 0 times
...
...
Herman
1 year ago
Hashing? Nah, that's more like hiding your secrets in plain sight. Give me that asymmetric encryption any day!
upvoted 0 times
...
Glen
1 year ago
I'm not sure, but isn't asymmetric encryption the one where you need a secret decoder ring to figure out the keys? Sounds like a spy movie to me!
upvoted 0 times
Lynda
1 year ago
Joanna: Yes, one for encryption and one for decryption.
upvoted 0 times
...
Nilsa
1 year ago
User 3: So it's like having two separate keys that work together to keep the data secure.
upvoted 0 times
...
Rodolfo
1 year ago
User 2: Yes, asymmetric encryption uses a public key for encryption and a private key for decryption.
upvoted 0 times
...
Anjelica
1 year ago
User 3: So, asymmetric encryption uses two keys?
upvoted 0 times
...
Joanna
1 year ago
That's correct!
upvoted 0 times
...
Melda
1 year ago
Asymmetric
upvoted 0 times
...
Novella
1 year ago
Asymmetric
upvoted 0 times
...
...
Carisa
1 year ago
I'm not sure, but I think D) Symmetric encryption uses the same key for both encryption and decryption.
upvoted 0 times
...
Felicitas
1 year ago
I agree with Charolette, asymmetric encryption uses two keys for encryption and decryption.
upvoted 0 times
...
Charolette
1 year ago
I think the answer is C) Asymmetric.
upvoted 0 times
...
Arlette
1 year ago
Symmetric encryption? Really? That's so last century. C'mon, let's get with the times and go for asymmetric encryption!
upvoted 0 times
Sueann
1 year ago
True, but for most modern applications, asymmetric encryption is the way to go.
upvoted 0 times
...
Hubert
1 year ago
Symmetric encryption may be old school, but it still has its uses in certain situations.
upvoted 0 times
...
Lashaunda
1 year ago
I agree, using two separate keys just makes it harder for hackers to crack.
upvoted 0 times
...
Tawanna
1 year ago
Asymmetric encryption is definitely the way to go. It's much more secure.
upvoted 0 times
...
...
Karrie
1 year ago
Asymmetric encryption seems like the obvious choice here. I mean, who doesn't love the idea of keeping their data secure with two keys?
upvoted 0 times
Gilma
1 year ago
Definitely, using two keys for encryption and decryption adds an extra layer of protection.
upvoted 0 times
...
Willow
1 year ago
I agree, asymmetric encryption is the way to go for double the security.
upvoted 0 times
...
...

Save Cancel