New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 6 Question 59 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 59
Topic #: 6
[All ISSAP Questions]

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B, D

widely distributed. A message encrypted with a recipient's public key cannot be decrypted by anyone except the owner of that key and the

person associated with the public key used. This is used for confidentiality. A message signed with a sender's private key can be verified by

anyone who has access to the sender's public key.

Answer options A and C are incorrect. Because of the asymmetric behavior of the keys, the secret key can encrypt a message, and anyone

with the public key can decrypt it. The distinguishing technique used in public key-private key cryptography is the use of asymmetric key

algorithms because the key used to encrypt a message is not the same as the key used to decrypt it.


Contribute your Thoughts:

0/2000 characters
Garry
4 months ago
Wait, can anyone explain why A is wrong?
upvoted 0 times
...
Lai
4 months ago
Totally agree, D is the right answer!
upvoted 0 times
...
Tammy
4 months ago
I thought symmetric keys were used in public-key cryptography?
upvoted 0 times
...
Yuette
4 months ago
A is misleading, it's actually the opposite.
upvoted 0 times
...
Judy
4 months ago
D is definitely true!
upvoted 0 times
...
Tamekia
5 months ago
I’m confused about B; it sounds like it could be true, but I thought only the private key could decrypt messages encrypted with the public key.
upvoted 0 times
...
Rolland
5 months ago
I practiced a similar question where the public key encrypts and the private key decrypts. So, I feel confident about D being correct.
upvoted 0 times
...
Dalene
5 months ago
I’m not entirely sure, but I think A is related to symmetric key cryptography, not public-key.
upvoted 0 times
...
Ailene
5 months ago
I remember that in public-key cryptography, the public key is used for encryption, and the private key is for decryption. So, I think D might be true.
upvoted 0 times
...
Celestina
5 months ago
Hmm, this looks like a tricky one. I think I'll try using breakpoints and the Watch function to step through the code and see where the unexpected value is coming from.
upvoted 0 times
...
Mari
5 months ago
Alright, I've got this. The default vulnerability policy in Prisma Cloud Compute is to alert on all vulnerabilities, regardless of severity. I'm confident that's the correct answer.
upvoted 0 times
...
Tyra
5 months ago
This seems like a straightforward question about inventory management. I'll focus on understanding the key concepts of safety stock and when it's used.
upvoted 0 times
...
Dallas
5 months ago
I seem to remember a practice question mentioning use cases for session storage, and Table Store came up as a valid option.
upvoted 0 times
...

Save Cancel