CompTIA Security+ Cert Prep 3 Part 2
(Answered) 100% Correct | Updated Fall
2024/2025.
Out-Band Key Exchange (Symmetric)
Separate channel outside of the normal communication channel to authenticate the user. More secure,
difficult and time consuming.
-face to face meeting
-physical mail
-telephone call
in-band key exchange
Securely exchange keys digitally
-Diffie Hellman
Diffie-Hellman
in-band key exchange
provides symmetric key exchange capability
prime factorization is underlying security
Encryption Key Escrow
Allows government access to keys
Clipper Chip
An early encryption system offered by the NSA for civilian use that was a hardware implementation of
the skipjack encryption algorithm.
- included technology that would allow government access to encrypted communications
-failed
recovery agents
allows internal access to lost keys
-master keys
key strectching
takes a relatively insecure value such as a password and uses mathematical techniques to strengthen it,
making it harder to crack
-combines salting and hashing
bcrypt
key stretching with blowfish
, Hardware Security Modules (HSM)
Manage encryption keys and perform cryptographic operations
trust models
personal knowledge
Web of Trust (WoT)
Public key infrastructure (PKI)
Web of Trust (WoT)
relies on individual relationships
-participants digitally sign public keys of people they know personally
Public Key Infrastructure (PKI)
System for creating public and private keys using a certificate authority (CA) and digital certificates for
authentication.
Certificate Authority (CA)
trusted third party organizations that verify the identity of individuals or organizations and then issue
digital certificates containing both identity information and a copy of the subject's public key
digital certificates
data files used to establish the identity of users and electronic assets for protection of online
transactions
hash functions
one way functions, can't be reversed
-the output of a ___ will always be the same length, regardless of the input size
- no two inputs to a ____ should produce the same output
Message Digest 5 (MD5)
Algorithm that creates a fixed-length 128-bit hash value unique to the input file
another term for hash
no longer secure
SHA-3
third version
government sponsored
uses completely different hash generation approach
produces hashes of a user-selected fixed length
RIPEMD
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.