New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 5 Question 91 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 91
Topic #: 5
[All ISSAP Questions]

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Jame
3 months ago
Hashing doesn't use keys, so it's not B.
upvoted 0 times
...
Nada
3 months ago
A is correct, no doubt about it!
upvoted 0 times
...
Gilberto
3 months ago
Wait, are we sure about that? I thought symmetric was more common.
upvoted 0 times
...
Pamela
4 months ago
Agreed, A is the right answer!
upvoted 0 times
...
Alonso
4 months ago
It's definitely A, Asymmetric encryption uses both keys!
upvoted 0 times
...
Shelia
4 months ago
Wait, is symmetric encryption just using one key? I think that rules out D, but I'm still a bit confused.
upvoted 0 times
...
Carla
4 months ago
I feel like I've seen a similar question before, and it was definitely about asymmetric encryption.
upvoted 0 times
...
Cheryl
4 months ago
I'm not entirely sure, but I remember hashing doesn't use keys at all, so it can't be B.
upvoted 0 times
...
Louvenia
5 months ago
I think the answer is A, Asymmetric, because it involves both a public and a private key.
upvoted 0 times
...
Annamae
5 months ago
Ah, I remember learning about this in class. Asymmetric cryptography, also known as public-key cryptography, is the way to go here. I've got this one.
upvoted 0 times
...
Dexter
5 months ago
Okay, let me think this through. Asymmetric encryption uses a public and private key, so that's got to be the answer. I'll mark that one down.
upvoted 0 times
...
Bonita
5 months ago
This one seems pretty straightforward. I'm pretty confident the answer is Asymmetric.
upvoted 0 times
...
Shaun
5 months ago
Hmm, I'm a bit unsure about this one. I know public and private keys are used in asymmetric encryption, but I want to double-check the other options just to be sure.
upvoted 0 times
...
Margot
5 months ago
Okay, I've got this. Policies provide guidance and direction to decision makers, so I'll select options B and C.
upvoted 0 times
...
Son
5 months ago
I think the key here is to focus on the reasons why the DNT header is not widely adopted. The options seem to be getting at different potential factors, so I'll need to carefully consider each one.
upvoted 0 times
...
Francine
2 years ago
I agree with Nichelle, asymmetric encryption is based on public and private keys.
upvoted 0 times
...
Sunny
2 years ago
I'm gonna have to go with A) Asymmetric. It's the only one that makes sense with the whole public/private key thing. Although, I do like the sound of C) Numeric. Maybe it's a secret new algorithm the NSA is hiding from us!
upvoted 0 times
Jade
1 year ago
Definitely, A) Asymmetric is the cryptographic algorithm that uses public and private keys.
upvoted 0 times
...
Shawna
1 year ago
I think C) Numeric sounds interesting, but A) Asymmetric is the right answer.
upvoted 0 times
...
Izetta
2 years ago
Yeah, A) Asymmetric is the only one that fits the description.
upvoted 0 times
...
Alishia
2 years ago
I agree, A) Asymmetric is the correct choice for using public and private keys.
upvoted 0 times
...
...
Phuong
2 years ago
Okay, let's think this through. Public and private keys... that's gotta be A) Asymmetric. Although, I did hear a rumor that C) Numeric is the new thing in crypto. Eh, I'll stick with A).
upvoted 0 times
...
Hassie
2 years ago
B) Hashing? Nah, that's just for one-way transformations. This is all about encryption, baby. A) Asymmetric is the way to go!
upvoted 0 times
...
Nichelle
2 years ago
I think it's A) Asymmetric because it uses both public and private keys.
upvoted 0 times
...
Jettie
2 years ago
Hmm, I think it's D) Symmetric. Wait, no, that's the one with a single key. Gah, I always mix those up!
upvoted 0 times
Moira
2 years ago
Actually, it's A) Asymmetric. It uses both public and private keys.
upvoted 0 times
...
Miriam
2 years ago
No, I believe it's D) Symmetric.
upvoted 0 times
...
Ammie
2 years ago
I think it's A) Asymmetric.
upvoted 0 times
...
Cora
2 years ago
I believe it's D) Symmetric, with a single key.
upvoted 0 times
...
Ty
2 years ago
No, that's the one with public and private keys.
upvoted 0 times
...
Kris
2 years ago
I think it's A) Asymmetric.
upvoted 0 times
...
...
Joaquin
2 years ago
Duh, it's obviously A) Asymmetric. I learned that in my crypto class! Public and private keys? Come on, it's not rocket science.
upvoted 0 times
Talia
2 years ago
I agree, it's definitely A) Asymmetric. It's a basic concept in cryptography.
upvoted 0 times
...
Kenneth
2 years ago
Yeah, you're right. Asymmetric encryption uses both public and private keys.
upvoted 0 times
...
...
Fatima
2 years ago
A) Asymmetric
upvoted 0 times
...

Save Cancel