New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 4 Question 17 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 17
Topic #: 4
[All ISSAP Questions]

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Show Suggested Answer Hide Answer
Suggested Answer: C

data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The

public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a

message sender or encrypting a message.

Answer option D is incorrect. Group Temporal Key (GTK) is a random value that is assigned by the broadcast/multicast source. It is used to

protect broadcast/multicast medium access control (MAC) protocol data units. It is derived from a group master key (GMK).

Answer option B is incorrect. Pairwise Transient Key (PTK) is a 64-byte key that comprises the following:

16 bytes of EAPOL-Key Confirmation Key (KCK): This key is used to compute MIC on WPA EAPOL Key message.

16 bytes of EAPOL-Key Encryption Key (KEK): AP uses this key to encrypt additional data sent (in the 'Key Data' field) to the client.

16 bytes of Temporal Key (TK): This key is used to encrypt/decrypt unicast data packets.

8 bytes of Michael MIC Authenticator Tx Key: This key is used to compute MIC on unicast data packets transmitted by the AP.

8 bytes of Michael MIC Authenticator Rx Key: This key is used to compute MIC on unicast data packets transmitted by the station.

Pairwise Transient Key is derived from the pairwise master key (PMK), Authenticator address (AA), Supplicant address (SPA), Authenticator

nonce (A Nonce), and Supplicant nonce (S Nonce) using pseudo-random function (PRF).

Answer option A is incorrect. Pairwise Master Key (PMK) is the highest order key used within the 802.11i amendment. It is derived directly from

a preshared key and can also be derived from the Extensible Authentication Protocol (EAP). It is a cryptography key that is used to derive

lower level keys.


Contribute your Thoughts:

0/2000 characters
Cordelia
3 months ago
Not convinced PKI is the only option here.
upvoted 0 times
...
Tyra
3 months ago
I thought PMK was more relevant in this context.
upvoted 0 times
...
Lelia
4 months ago
Wait, isn't GTK also used for security?
upvoted 0 times
...
Billye
4 months ago
Yeah, PKI is the way to go for secure data exchange.
upvoted 0 times
...
Ahmed
4 months ago
Pretty sure it's PKI.
upvoted 0 times
...
Dong
4 months ago
I'm pretty confident that the answer is C. PKI, or Public Key Infrastructure, is designed to enable secure data exchange over unsecured networks by using digital certificates and public/private key pairs.
upvoted 0 times
...
Shakira
4 months ago
Okay, let me try to break this down. The key is that it needs to be an infrastructure system, not just a cryptographic algorithm or protocol. I think PKI might be the best fit.
upvoted 0 times
...
Margery
4 months ago
Hmm, I'm a bit unsure about this one. I know PKI is related to digital certificates, but I'm not sure if that's the right answer here.
upvoted 0 times
...
Leonie
5 months ago
This looks like a question on cryptography and network security. I'll need to think through the different infrastructure systems that enable secure data exchange.
upvoted 0 times
...
Dorothy
5 months ago
I’m leaning towards PTK, but I can’t quite recall how it fits into secure data exchange.
upvoted 0 times
...
Olive
5 months ago
I practiced a question like this, and I feel like PMK was mentioned in a different context, so it probably isn't the answer.
upvoted 0 times
...
Tracey
5 months ago
I'm a bit unsure, but I remember something about GTK being related to encryption. Is that right?
upvoted 0 times
...
Franklyn
5 months ago
I think PKI might be the right answer since it deals with public key infrastructure for secure data exchange.
upvoted 0 times
...
Oren
5 months ago
I'm a bit confused about IGRP - I thought it was a classful protocol, not classless. I'll skip that one for now.
upvoted 0 times
...
Annice
5 months ago
Okay, let me see here. The escape sequence with the backslash makes sense. And a code point being a number for a character - that's definitely true. I'm not too sure about the other two though, so I'll have to guess on those.
upvoted 0 times
...

Save Cancel