ISC2 Certified in Cybersecurity (CC) Practice Question

Which statement correctly explains why asymmetric encryption is preferred over symmetric encryption for exchanging keys between parties?

  • It uses a single key that both parties already possess, reducing overhead.

  • It converts plaintext into a non-reversible hash, so no key exchange is needed.

  • Its algorithms run faster than symmetric encryption, making real-time key exchange practical.

  • It enables two parties to establish encryption without transmitting a shared secret.

ISC2 Certified in Cybersecurity (CC)
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot