6. Cryptography and PKI

Domain 6 Questions

  1. Adam created a message and then computed a message digest based upon that message. He then altered a single character at the end of the message and then recomputed the message digest. Which one of the following statements about the second message digest is correct?

    A. The second message digest should be one character different from the first digest.

    B. The second message digest will be completely different from the first digest.

    C. There may be minor differences in the second message digest,e but they will be toward the end of the digest.

    D. The two digests will essentially be the same, with minor differences.

  2. Which one of the following encryption algorithms does not rely upon the difficulty of factoring ...

Get Security+® Practice Tests now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.