Appendix BAnswers to Review Questions
Chapter 1: Cryptographic Tools and Techniques
- B. Symmetric encryption offers privacy as a feature but suffers from problems with key distribution and key management.
- C. The MD algorithms are a series of cryptographic algorithms that were developed by Ron Rivest. MD5 processes a variable-size input and produces a fixed 128-bit output.
- B. A digital signature is a hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity.
- C. The easiest way to check whether the lost key has been flagged by the system is to use the Online Certificate Status Protocol to check the certificate and verify if it is valid.
- D. A CRL lists revoked certificates.
- A. Wildcard certificates ...
Get CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.