Appendix B

Answers to Review Questions

Chapter 1: Cryptographic Tools and Techniques

1. B. Symmetric encryption offers privacy as a feature but suffers from problems with key distribution and key management.

2. C. The MD algorithms are a series of cryptographic algorithms that were developed by Ron Rivest. MD5 processes a variable-size input and produces a fixed 128-bit output.

3. B. A digital signature is a hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity.

4. C. The easiest way to check to see if the lost key has been flagged by the system is to use the online certificate to check the status of the certificate.

5. D. A certificate revocation list is where revoked certificates ...

Get CASP: CompTIA® Advanced Security Practitioner, Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.