CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 45


On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?

Show Answer
Correct Answer: A

In a public-key cryptosystem, when there is no previous knowledge between parties, sending a certificate that can be verified by a certification authority with the public key is the best method to prevent impersonation. Certificates bind a public key to a specific entity, and the certification authority's verification ensures the authenticity of the key. This establishes trust and prevents unauthorized individuals from using fictitious keys to impersonate legitimate parties.

Discussion

6 comments
Sign in to comment
abeedfarooqui86Option: A
Jul 11, 2023

Answer: A Since there is no previous connection, the initial link must be established via CA.

lsiau76Option: A
Aug 19, 2023

A. Send a certificate that can be verified by a certification authority with the public key. Sending a certificate that can be verified by a certification authority with the public key would be the best approach to prevent one person from using a fictitious key to impersonate someone else in a public-key cryptosystem. Certificates are used to bind a public key to a specific entity, and a certification authority's verification helps ensure the authenticity of the key. This approach establishes trust and prevents unauthorized individuals from using fake keys to impersonate legitimate parties.

ChangwhaOption: A
Jul 10, 2023

A, Sending a certificate that can be verified by a certification authority (CA) with the public key helps establish trust and authenticity.

5b56aaeOption: B
Apr 19, 2024

only the recipient could decrypt the message and get the sender's public key. Using the sender's public key, the recipient can reply the message under the same mechnism.

a84nOption: A
Apr 25, 2024

Answer: A

SwallowsOption: A
Jul 14, 2024

Option B does not verify the authenticity of the sender's public key, leaving the risk that someone using a forged key could send a message, thus requiring the use of certificates from a Certification Authority.