Which of the following is a characteristic of Public Key Infrastructure (PKI)?
A.
Public-key cryptosystems are faster than symmetric-key cryptosystems.
B.
Public-key cryptosystems distribute public-keys within digital signatures.
C.
Public-key cryptosystems do not require a secure key distribution channel.
D.
Public-key cryptosystems do not provide technical non-repudiation via digital signatures.
Im not sure about certificate.
I know that PKI use it that way (cert+key), but public key cryptosystems (a.k.a – asymmetric cryptosystems) really DO NOT require any secure key distribution channel. You can give (publish or send in plain) your public key to anyone who wishes to send a secret message to you. Public key REALLY doesn’t need to be keep secret.
(Of course, your private key will never leave your vault.)
The secure channel needed for key delivery is the most important weakness of symmetric cryptosystems, and public key cryptosystems are invented in order to overcome this weakness.
I suggest answer C).
Wrong, its B
B
B is not really correct since they said ” within “.
Digital signatures is the message hashed then encrypted with the private key. The recipient must obtain the public key from elsewhere to decrypt the hash and verify the message and sender.
The signature does NOT contain a public key… it NEEDS a public key
Now, if B said digital Certificates… then it would be correct.
From MasterExam:
A digital certificate contains, among other things, the sender’s public key, and can be used to identify the sender.
The digital signature does not contain a copy of the public key.
I will go with C as well…. Although seeing Miguel went with B… I am Worried 🙂
Don’t worry about Miguel…..he/she is just copying-pasting answers after checking…..not provided any single explanation in last 692 questions…..seems like a bug….a repeater bug.
Yeah, that dude is useless.
Answer: C
Public-key cryptography is often used to secure electronic communication over an open networked environment such as the internet, without relying on a covert channel even for key exchange. Open networked environments are susceptible to a variety of communication security problems such as man-in-the-middle attacks and other security threats. Security properties required for communication typically include that the communication being sent must not be readable during transit (preserving confidentiality), the communication must not be modified during transit (preserving the integrity of the communication), the communication must originate from an identified party (sender authenticity) and to ensure non-repudiation or non-denial of the sending of the communication. Combining public-key cryptography with an Enveloped Public Key Encryption (EPKE)[3] method, allows for the secure sending of a communication over an open networked environment.
https://en.wikipedia.org/wiki/Public-key_cryptography
Here says the answer is B
http://www.aiopass4sure.com/ec-council-exams/312-50v8-exam-questions/which-of-the-following-is-a-characteristic-of-public-key-infrastructure-pki.html
Here says the answer is B
http://www.certbibles.com/latest-eccouncil-312-50v8-real-exam-download-341-350.html?upm_export=pdf
Here says the answer is B
http://pass4examination.blogspot.com.es/2014/05/latest-eccouncil-312-50v8-real-exam_8381.html
If any link doesn’t work just type on google the question with double quotes.
Why are you guys so sure the correct answer FOR EC-COUNCIL is C?