Questions
Questions

Introduction to Security and Forensic Technologies (CT046-3-1-ISFT-25-RESIT)

Single choice

Which cryptographic algorithm is widely used in PKI encryption?

Options
A.a. RSA (Rivest-Shamir-Adleman)
B.b. SHA-256 (Secure Hash Algorithm 256-bit)
C.c. AES (Advanced Encryption Standard)
D.d. SHA-512 (Secure Hash Algorithm 512-bit)
Question Image
View Explanation

View Explanation

Verified Answer
Please login to view
Step-by-Step Analysis
To begin, let’s identify what PKI encryption typically relies on. PKI (Public Key Infrastructure) primarily uses public-key cryptography to enable secure key exchange, digital signatures, and certificate-based authentication. Option a: a. RSA (Rivest-Shamir-Adleman). This is the classic public-key algorithm widely......Login to view full explanation

Log in for full answers

We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!

More Practical Tools for Students Powered by AI Study Helper

Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!