Exam Essentials

Know the trust models used in PKI. PKI provides the ability to use hierarchical, bridged, meshed, and hybrid models for trust. A CA hierarchy, or tree, is broken into subcomponents. The subcomponents are called root authorities, intermediate CAs, and leaf CAs.

Know the primary attack methods used against cryptographic systems. The primary attacks against cryptographic systems are birthday attacks, mathematical attacks, and weak key attacks.

Identify the stages in a key/certificate life cycle. A life cycle involves the generation, distribution, protection, archiving, recovery, and revocation of a key or certificate. Each of these aspects of key management must be considered to provide an effective and maintainable security process. ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.