New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 111 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 111
Topic #: 3
[All CISSP Questions]

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

Show Suggested Answer Hide Answer
Suggested Answer: A

Derived credential is the best description of an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices. A smart card is a device that contains a microchip that stores a private key and a digital certificate that are used for authentication and encryption. A smart card is typically inserted into a reader that is attached to a computer or a terminal, and the user enters a personal identification number (PIN) to unlock the smart card and access the private key and the certificate. A smart card can provide a high level of security and convenience for the user, as it implements a two-factor authentication method that combines something the user has (the smart card) and something the user knows (the PIN).

However, a smart card may not be compatible or convenient for mobile devices, such as smartphones or tablets, that do not have a smart card reader or a USB port. To address this issue, a derived credential is a solution that allows the user to use a mobile device as an alternative to a smart card for authentication and encryption. A derived credential is a cryptographic key and a certificate that are derived from the smart card private key and certificate, and that are stored on the mobile device. A derived credential works as follows:

The user inserts the smart card into a reader that is connected to a computer or a terminal, and enters the PIN to unlock the smart card

The user connects the mobile device to the computer or the terminal via a cable, Bluetooth, or Wi-Fi

The user initiates a request to generate a derived credential on the mobile device

The computer or the terminal verifies the smart card certificate with a trusted CA, and generates a derived credential that contains a cryptographic key and a certificate that are derived from the smart card private key and certificate

The computer or the terminal transfers the derived credential to the mobile device, and stores it in a secure element or a trusted platform module on the device

The user disconnects the mobile device from the computer or the terminal, and removes the smart card from the reader

The user can use the derived credential on the mobile device to authenticate and encrypt the communication with other parties, without requiring the smart card or the PIN

A derived credential can provide a secure and convenient way to use a mobile device as an alternative to a smart card for authentication and encryption, as it implements a two-factor authentication method that combines something the user has (the mobile device) and something the user is (the biometric feature). A derived credential can also comply with the standards and policies for the use of smart cards, such as the Personal Identity Verification (PIV) or the Common Access Card (CAC) programs.

The other options are not the best descriptions of an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices, but rather descriptions of other methods or concepts. Temporary security credential is a method that involves issuing a short-lived credential, such as a token or a password, that can be used for a limited time or a specific purpose. Temporary security credential can provide a flexible and dynamic way to grant access to the users or entities, but it does not involve deriving a cryptographic key from a smart card private key. Mobile device credentialing service is a concept that involves providing a service that can issue, manage, or revoke credentials for mobile devices, such as certificates, tokens, or passwords. Mobile device credentialing service can provide a centralized and standardized way to control the access of mobile devices, but it does not involve deriving a cryptographic key from a smart card private key. Digest authentication is a method that involves using a hash function, such as MD5, to generate a digest or a fingerprint of the user's credentials, such as the username and password, and sending it to the server for verification. Digest authentication can provide a more secure way to authenticate the user than the basic authentication, which sends the credentials in plain text, but it does not involve deriving a cryptographic key from a smart card private key.


Contribute your Thoughts:

0/2000 characters
Paris
3 days ago
Mobile device credentialing service? Sounds like a fancy way to say "let your phone do the work for you."
upvoted 0 times
...
Jacinta
8 days ago
Haha, "temporary security credential"? More like a temporary headache if you ask me.
upvoted 0 times
...
Linwood
13 days ago
Derived credential is the way to go! Keeps my mobile device secure like a digital vault.
upvoted 0 times
...
Vernice
19 days ago
I practiced a similar question last week, and I think it was about derived credentials too. I’m leaning towards A, but I need to double-check my notes.
upvoted 0 times
...
Matt
24 days ago
I’m a bit confused; I thought digest authentication was more about hashing than keys. Is that even related?
upvoted 0 times
...
Elouise
29 days ago
I remember studying something about mobile device security, and I feel like C) Mobile device credentialing service could be relevant here.
upvoted 0 times
...
Elbert
1 month ago
I think the answer might be A) Derived credential, but I'm not entirely sure how it relates to smart cards.
upvoted 0 times
...
Arthur
1 month ago
I'm pretty confident this is asking about derived credentials. The description matches what I know about that access control method using mobile device keys.
upvoted 0 times
...
Leatha
1 month ago
For this one, I'm going to focus on the details about the cryptographic keys and the smart card private key. That seems like the most important part to understand.
upvoted 0 times
...
Nettie
2 months ago
I'm a bit confused on the difference between a derived credential and a temporary security credential. They both seem to involve some kind of mobile device authentication.
upvoted 0 times
...
Cathrine
2 months ago
Okay, let's see. I think the key is that it's using a private key from a smart card embedded in the mobile device. That sounds like a derived credential to me.
upvoted 0 times
...
Lilli
2 months ago
Hmm, this seems like a tricky one. I'll need to think through the key details here - something about cryptographic keys and mobile devices.
upvoted 0 times
...

Save Cancel