CHAPTER SUMMARY

This chapter discussed symmetric and asymmetric encryption algorithms and how they are used with a public key infrastructure. You read about the risks associated with maintaining key management and certificate authorities in-house and outsourcing them. You reviewed the security services that are provided through the various PKI functions and how each of them functions individually. Understanding these concepts will assist you in understanding why this technology is needed and how its use has expanded over time.

KEY CONCEPTS AND TERMS

CHAPTER 11 ASSESSMENT

  1. PKI is also known as symmetric encryption.
    1. True
    2. False
  2. An encryption algorithm using 2,048-bit keys is always more secure than an algorithm using 128-bit keys.
    1. True
    2. False
  3. Which of the following are examples of symmetric algorithms? (Select two.)
    1. RSA
    2. 3DES
    3. AES
    4. Diffie-Hellman
  4. Which of the following is an example of an asymmetric algorithm?
    1. RSA
    2. 3DES
    3. AES
    4. Diffie-Hellman
  5. Asymmetric encryption is faster than symmetric encryption.
    1. True
    2. False
  6. A symmetric encryption algorithm provides which security services? (Select three.)
    1. Confidentiality
    2. Identity
    3. Authentication
    4. Authorization
    5. Nonrepudiation
  7. Certificate authorities document their business practices surrounding the issuance, revocation, and renewal of certificates in a _______________.
  8. Which of the following is the standard for certificates?
    1. X.510
    2. Certificate authority
    3. X.509
    4. Certificate validation
  9. Which of the following terms is the range of values that construct a cryptosystem key?
    1. Key length
    2. Key values
    3. Keyspace
    4. Key construction
  10. Digital signatures provide which of the following? (Select two.)
    1. Confidentiality
    2. Integrity
    3. Authentication
    4. Authorization
    5. Nonrepudiation
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.9.236