CompTIA Security+ Chp 12
When Bob sends a message to Sue, which of the following represents the key used to ensure non-repudiation?
Bob's private key is used to digitally sign the message to prove that the message came from Bob and no one else. This is a way to ensure non-repudiation
Which of the following cryptography services is responsible for providing confidentiality?
Encryption is the cryptography service that provides confidentiality by converting plain text information to cipher text so it is unreadable to unauthorized individuals.
Which of the following cryptography services is responsible for ensuring data integrity?
Hashing is the cryptography service used to ensure data integrity
Which of the following VPN protocols uses IPSec to secure the communication?
L2TP is a VPN protocol that uses IPSec for data encryption.
Which of the following are considered hashing protocols? (choose 2)
MD5 and SHA-1 are examples of hashing algorithms. MD5 is used to create a 128-bit hash value. SHA-1 is used to create a 160-bit hash value.
Which of the following is considered an asymmetric encryption algorithm?
RSA is the only asymmetric encryption algorithm that is listed. Another example of an asymmetric encryption algorithm is Diffie-Hellman.
Which of the following hashing algorithms generates a 160-bit hash value?
SHA-1 is a hashing algorithm that generates a 160-bit hash value. The relevance of the size of the hash value is that you are less likely to have collisions with larger values than with hash values with smaller key spaces (such as 128-bit)
Which of the following identifies the disadvantage of symmetric encryption?
The biggest disadvantage to symmetric encryption is key management, which means you need to create too many keys as the number of users increases. And how do you securely communicate the key to an individual?
Which of the following symmetric encryption algorithms offers the strongest encryption?
The new and most secure algorithm for symmetric encryption is AES, and AES256, using a 256-bit encryption, is the strongest algorithm listed
With asymmetric encryption, when Bob encrypts an email and sends the message to Sue, which key is used to encrypt the message?
To asymmetrically encrypt a message, the message is encrypted with the recipient's public key
Which of the following protocols was designed as a more secure replacement of SSL?
Transport Layer Security (TLS) was designed as a replacement for SSL
Using the following data and encryption key in binary format, calculate the cipher text using XOR logic. Plain text = 11011011, Key=10110101, Cipher text=
When encrypting information using an XOR function, remember that when adding two bits, if one of the bits is a 1, then the resulting bit is a 1, any other combination results in a 0 Cipher text = 01101110
Using the following illustration, place the algorithms listed on the right side into the correct category. Categories: hashing, asymmetric, symmetric
hashing [MD5, SHA1] Asymmetric [RSA, Diffie-Hellman] Symmetric [AES, DES, Blowfish, RC4]