CompTIA Security Plus Mock Test Q1127

When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of the following should be used for transmitting company documents?

A. Digital Signature
B. Symmetric
C. Asymmetric
D. Hashing

Correct Answer: C
Section: Cryptography

Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as the public key and the private key. Asymmetric algorithms do not require a
secure channel for the initial exchange of secret keys between the parties.

Incorrect Answers:
A: A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender.
B: Symmetric encryption would not in itself help on an unsecure channel.
D: Hashing is used to prove the integrity of data to prove that it hasn’t been modified.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, pp. 249-251, 256, 261, 291