Home
You may like this!
51.
When hashing a message, which of the following security goals is being provided?
  • A.
    Confidentiality
  • B.
    Encryption
  • C.
    Accounting and availability
  • D.
    Integrity
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The purpose of a hashing algorithm is to provide integrity. The message is hashed at each end of the transmission, and if the hash is equal, the message did not change. Options A, B, and C are incorrect because they have nothing to do with a hashing algorithm.
Report
Name Email  
52.
Which key is used to provide proof of origin?
  • A.
    The sender’s public key
  • B.
    The sender’s private key
  • C.
    The receiver’s public key
  • D.
    The receiver’s private key
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The only person who would have access to the sender’s private key is the sender. Option A is incorrect. Anyone could encrypt a message using the sender’s public key. Option C is incorrect; although anyone could encrypt a message using the receiver’s public key, it would not provide proof of origin. Option D is incorrect because the only person who has access to the receiver’s private key is the receiver.
Report
Name Email  
53.
Which best describes a multiple-person technique for use to recover a corrupted key?
  • A.
    Separation of duties
  • B.
    Multiple-key agent rule
  • C.
    Staged multiple interaction
  • D.
    M of N
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Option D is correct because a set number of multiple persons (M) out of a group of persons (N) may be able to take the required action. Option A is incorrect because separation of duties has nothing to do with multiple-person key recovery. Option B is incorrect because there is no such thing as a multiple-man rule. Option C is incorrect because staged multiple interaction does not exist.
Report
Name Email  
54.
Which choice is not a commonly accepted definition of symmetric key?
  • A.
    A key that may be publicly exchanged
  • B.
    A key that can be used for authentication
  • C.
    A key used in Kerberos SSO
  • D.
    A key that must be kept secret
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Symmetric keys are kept secret and are never publicly exchanged. Options B, C, and D are incorrect because they are all characteristics of a symmetric key.
Report
Name Email  
55.
Which of the following is an inaccurate statement about an organization’s encryption policy?
  • A.
    Private keys should be protected at all times.
  • B.
    Local data should always be encrypted with the user’s public key.
  • C.
    The longer the storage, the longer the key.
  • D.
    Important keys should be kept in a storage location or key escrow.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Data encrypted with a user’s public key can be encrypted only by the user’s private key. This would not normally be in an organization’s encryption policy. Options A, C, and D are all reasonable items to include in an organization’s encryption policy.
Report
Name Email