{"id":93345,"date":"2025-06-01T11:48:50","date_gmt":"2025-06-01T11:48:50","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=93345"},"modified":"2025-06-01T11:48:50","modified_gmt":"2025-06-01T11:48:50","slug":"what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/","title":{"rendered":"What is a system of a secure key pair consisting of a private key for"},"content":{"rendered":"<p>What is a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature, known as:<\/p>\n<p>[amp_mcq option1=&#8221;Asymmetric crypto system&#8221; option2=&#8221;Secure system&#8221; option3=&#8221;Symmetric crypto system&#8221; option4=&#8221;Digital signature certificate&#8221; correct=&#8221;option1&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CISF-AC-EXE &#8211; 2023<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-cisf-ac-exe-2023.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-cisf-ac-exe-2023\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nThe correct answer is A) Asymmetric crypto system.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\nA system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\nIn asymmetric cryptography, the public key can be freely distributed, while the private key must be kept secret by its owner. For digital signatures, the sender uses their private key to sign data. The recipient uses the sender&#8217;s public key to verify that the signature is valid and was created by the owner of the corresponding private key. Symmetric crypto systems use the same key for both encryption\/decryption or signing\/verification, which is not the case described here. A digital signature certificate is a digital document that uses asymmetric cryptography to link a public key to an identity, but it is not the crypto system itself.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>What is a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature, known as: [amp_mcq option1=&#8221;Asymmetric crypto system&#8221; option2=&#8221;Secure system&#8221; option3=&#8221;Symmetric crypto system&#8221; option4=&#8221;Digital signature certificate&#8221; correct=&#8221;option1&#8243;] This question was previously asked in UPSC CISF-AC-EXE &#8211; 2023 Download PDFAttempt &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"What is a system of a secure key pair consisting of a private key for\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/#more-93345\">Detailed Solution<span class=\"screen-reader-text\">What is a system of a secure key pair consisting of a private key for<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1089],"tags":[1105,1113],"class_list":["post-93345","post","type-post","status-publish","format-standard","hentry","category-upsc-cisf-ac-exe","tag-1105","tag-information-and-communication-technology","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a system of a secure key pair consisting of a private key for<\/title>\n<meta name=\"description\" content=\"The correct answer is A) Asymmetric crypto system. A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a system of a secure key pair consisting of a private key for\" \/>\n<meta property=\"og:description\" content=\"The correct answer is A) Asymmetric crypto system. A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T11:48:50+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a system of a secure key pair consisting of a private key for","description":"The correct answer is A) Asymmetric crypto system. A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/","og_locale":"en_US","og_type":"article","og_title":"What is a system of a secure key pair consisting of a private key for","og_description":"The correct answer is A) Asymmetric crypto system. A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T11:48:50+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/","url":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/","name":"What is a system of a secure key pair consisting of a private key for","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T11:48:50+00:00","dateModified":"2025-06-01T11:48:50+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"The correct answer is A) Asymmetric crypto system. A system using a pair of mathematically related keys, one private and one public, where the private key is used for operations like creating a digital signature and the public key is used for verification, is known as an asymmetric crypto system. This is also commonly referred to as public-key cryptography.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/what-is-a-system-of-a-secure-key-pair-consisting-of-a-private-key-for\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CISF-AC-EXE","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-cisf-ac-exe\/"},{"@type":"ListItem","position":3,"name":"What is a system of a secure key pair consisting of a private key for"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=93345"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93345\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=93345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=93345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=93345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}