click below
click below
Normal Size Small Size show me how
Chapter 8 Essentials
Security+ SY0-501 7th Edition Exam Essentials (Chapter 8)
Question | Answer |
---|---|
Be able to describe the process of a hashing algorithm. | Hashing algorithms are used to generate a fixed-length value mathematically from a message. The most common hashing standards for cryptographic applications are the SHA and MD algorithms. |
Know the principles of a symmetric algorithm. | A symmetric algorithm requires that receivers of the message use the same private key. Symmetric algorithms can be extremely secure. This method is widely implemented in governmental applications. |
Be able to describe the process of asymmetric algorithms. | Asymmetric algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private key. The key is derived from the same algorithm. |
Know the primary objectives for using cryptographic systems. | The main objectives for these systems are confidentiality, integrity, authentication, and nonrepudiation. Digital signatures can be used to verify the integrity and provide nonrepudiation of a message. |
Understand the process used in PKI. | Enryption system that uses a variety of technologies to provide confidentiality, integrity, authentication, and nonrepudiation. PKI uses certificates issued from a CA to provide this capability as well as encryption. |