CERTIVIEW

Wednesday, 12 October 2016

Security+ Question of the Week: Cryptographic Solution

securityQOW02How is integrity verified using a cryptographic solution?

A. Checking the pre and post hash values
B. Replacing the symmetric key often
C. Keeping the private key on a removable media
D. Use longer keys

Reveal Answer

The correct answer is A.

Integrity is verified using the cryptographic solution of checking the pre and post hash values against each other to see if they are exactly the same. This process is usually performed by employing the binary operator of XOR, where if the two binary hash values being compared are exactly the same, the result of the XOR is 0 (zero), but if they are different then the result is a non-zero value. Replacing the symmetric key often is a good idea, it is the basis of ephemeral keying, but it does not related to integrity. Keeping the private key on a removable media is a secure storage mechanisms, but it does not relate to integrity. Use of longer keys is a good security concept for cryptography, as longer keys make brute force attacks more difficult, but that does not relate to integrity.

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series

  • Security+ Question of the Week: Deploying a Firewall
  • Security+ Question of the Week: Flood Guard
  • Security+ Question of the Week: iSCSI
  • Security+ Question of the Week: Wireless MAC Filtering
  • Security+ Question of the Week: Quantitative Analysis
  • Security+ Question of the Week: Contracts
  • Security+ Question of the Week: System Clock
  • Security+ Question of the Week: Security Breach Incident Response
  • Security+ Question of the Week: Reduce Electrostatic Discharge
  • Security+ Question of the Week: Planting Malware
  • Security+ Question of the Week: Network Hardening
  • Security+ Question of the Week: Fuzzing
  • Security+ Question of the Week: Single Sign‐On
  • Security+ Question of the Week: Digital Envelope
  • Security+ Question of the Week: Confining Communications to a Subnet
  • Security+ Question of the Week: DoS Tool
  • Security+ Question of the Week: Intranet Defense
  • Security+ Question of the Week: War Driving
  • Security+ Question of the Week: User Rights and Permissions Checks
  • Security+ Question of the Week: Third Party Partnerships
  • Security+ Question of the Week: Indicator of Integrity
  • Security+ Question of the Week: Incident Response Procedure
  • Security+ Question of the Week: Good Password Behavior
  • Security+ Question of the Week: Tailgating
  • Security+ Question of the Week: Differential Backup
  • Security+ Question of the Week: Government and Military
  • Security+ Question of the Week: Backdoor
  • Security+ Question of the Week: Wrong Name or Address
  • Security+ Question of the Week: Increase in Email Hoaxes
  • Security+ Question of the Week: Suspicious Location-Based Messages
  • Security+ Question of the Week: Session Hijack
  • Security+ Question of the Week: Definition of a Threat
  • Security+ Question of the Week: Dismiss Alarms
  • Security+ Question of the Week: NoSQL vs. SQL Database
  • Security+ Question of the Week: BYOD Compliance
  • Security+ Question of the Week: Missing Storage Devices
  • Security+ Question of the Week: Data Processed by an Application
  • Security+ Question of the Week: LDAP Port
  • Security+ Question of the Week: Authentication System
  • Security+ Question of the Week: Cryptographic Solution


from
CERTIVIEW
Unknown at 03:27
Share

No comments:

Post a Comment

‹
›
Home
View web version

About Me

Unknown
View my complete profile
Powered by Blogger.