What is the process of deriving an encrypted value from a mathematical process called?
a. Hashing
b. Asymmetric
c. Symmetric
d. Social engineering
Answer: A
Hashing algorithms are used to derive an encrypted value from a message or word.
Learn More :
Cryptography Basics
- Which of the following best describes the process of encrypting and decrypting data using an asymmetric encryption algorithm?
- Which of the following algorithms is not an example of a symmetric encryption algorithm?
- Which authorization protocol is generally compatible with TACACS?
- What is the acronym for the de facto cryptographic message standards developed by RSA Laboratories?
- Which of the following is the type of algorithm used by MD5?
- Which of the following is a hybrid cryptosystem?
- Which of the following is not one of the four main types of trust models used with PKI?
- Certificate revocation is the process of revoking a certificate before it:
- A Certificate Practice Statement (CPS) is a detailed statement the CA uses to issue certificates and ______ of the CA.
- The process of requiring interoperability is called:
- The most popular certificate used is version 3 of:
- The primary difference between an RA and _____ is that the latter can be used to identify or establish the identity of an individual.
- A registration authority (RA) can do all the following except:
- A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing:
- PKI (Public Key Infrastructure) is a key-asymmetric system utilizing how many keys?
- A brainstorming session has been called. The moderator tells you to pull out a sheet of paper and write down your security concerns based on the technologies that your company uses. If your company uses public keys, what should you write as the primary security concern?
- Which of the following is similar to Blowfish but works on 128-bit blocks?
- Which set of specifications is designed to allow XML-based programs access to PKI services?
- The CRL takes time to be fully disseminated. Which protocol allows a certificate's authenticity to be immediately verified?
- After returning from a conference in Jamaica, your manager informs you that he has learned that law enforcement has the right, under subpoena, to conduct investigations using keys. He wants you to implement measures to make such an event run smoothly should it ever happen. What is the process of storing keys for use by law enforcement called?
- What document describes how a CA issues certificates and what they are used for?
- Kristin, from Payroll, has left the office on maternity leave and won't return for at least six weeks. You've been instructed to suspend her key. Which of the following statements is true?
- Which organization can be used to identify an individual for certificate issue in a PKI environment?
- Due to a breach, a certificate must be permanently revoked, and you don't want it to ever be used again. What is often used to revoke a certificate?
- What is the primary organization for maintaining certificates called?