IIA-CIA-Part3 Exam QuestionsBrowse all questions from this exam

IIA-CIA-Part3 Exam - Question 44


Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?

Show Answer
Correct Answer: BD

In public key infrastructure (PKI), the authenticity of the public key is critical. The public key serves as a digital certificate issued by a trusted third-party authority, known as a Certificate Authority (CA). This CA verifies the identity of the key holder before issuing the certificate, thus ensuring that the public key is authenticated against reliable third-party identification. This process is essential to establish trust in the use of public and private keys for encryption and digital signatures.

Discussion

4 comments
Sign in to comment
dedfefOption: A
Dec 8, 2020

A is correct too

sed999Option: A
Dec 2, 2021

answer A

CrazyhydraOption: B
Sep 28, 2023

Yes but A is not "always" true

DomiiiOption: D
Jan 9, 2024

The statement that is always true regarding the use of encryption algorithms based on public key infrastructure (PKI) is: D. The private key uniquely authenticates each party to a transaction. In PKI, each party involved in a transaction possesses a pair of cryptographic keys: a public key and a private key. The private key is kept secret and is known only to the owner, while the public key is freely distributed. The private key uniquely authenticates the party who possesses it, and it is used to decrypt messages that have been encrypted with the corresponding public key.