Domain 3: Public Key Infrastructure
As a Cybersecurity Progressional, you are researching a secure communication method for exchanging encryption keys only known between shared parties that is provable and guarantees security, relying only on a Shared Key encryption method to encrypt and decrypt messages. Which method would you choose?
Public Key Encryption
Asymmetric Encryption
Quantum Key Distribution (QKD)
Internet Key Exchange (IKE)
16 votes
2
4 comments
Peter Scheuermann
3
Domain 3: Public Key Infrastructure
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by