Beruflich Dokumente
Kultur Dokumente
Chapter 1
Basics of Cryptography...................................................................... 2
Answer Key 130
Explanations 151
Chapter 2
Communication Security.................................................................. 18
Answer Key 133
Explanations 177
Chapter 3
General Security Concepts............................................................... 42
Answer Key 137
Explanations 216
Chapter 4
Infrastructure Security..................................................................... 89
Answer Key 143
Explanations 286
Chapter 5
Operational/Organizational Security............................................ 113
Answer Key 147
Explanations 322
Security+ Printables
Copyright 2005 by PrepLogic, Inc.
Product ID: 2503
Production Date: April 15, 2005
Total Questions: 400
All rights reserved. No part of this document shall be stored in a retrieval system
or transmitted by any means, electronic, mechanical, photocopying, recording, or
otherwise, without written permission from the publisher. No patent liability is
assumed with respect to the use of the information contained herein.
1-800-418-6789
solutions@preplogic.com
Basics of Cryptography 2
Chapter 1
Basics of Cryptography
1. Which of the following is the difference between confidentiality and integrity?
A. Non-repudiation
B. Authentication
C. Integrity
D. Confidentiality
Find the Answer p. 130
A. Symmetric keys
B. Software
C. Certificate Authority
D. Key pairs
Find the Answer p. 130
Basics of Cryptography 3
A. Certificate Policy
B. Bridge CA
C. CRL
D. PKIX
Find the Answer p. 130
A. centralized
B. decentralized
C. horizontal
D. vertical
Find the Answer p. 130
A. private
B. public
C. personal
D. protected
Find the Answer p. 130
Basics of Cryptography 130
Answers: Chapter 1
1. A Review Question p. 2 Detailed Explanation p. 151
Explanations: Chapter 1
1. Review Question p. 2
Answers: A
Explanation A. Confidentiality involves sending messages to authorized parties
without unauthorized parties being able to understand it. Integrity shows that a message
has not been altered since the encrypted version of the message was created.
Explanation B. Confidentiality involves sending messages to authorized parties without
unauthorized parties being able to understand it. Integrity shows that a message has not
been altered since the encrypted version of the message was created.
Explanation C. Confidentiality involves sending messages to authorized parties
without unauthorized parties being able to understand it. Integrity shows that a message
has not been altered since the encrypted version of the message was created.
Explanation D. Confidentiality involves sending messages to authorized parties
without unauthorized parties being able to understand it. Integrity shows that a message
has not been altered since the encrypted version of the message was created.
More Information:
The difference between confidentiality and integrity?
2. Review Question p. 2
Answers: A
Explanation A. Non-repudiation is a stronger variation of authentication in that it
allows the sender's identity to be verified by a 3rd party.
Explanation B. Authentication is the process of verifying the specific person who sent
a message
Explanation C. Integrity is the process that shows a message has not been altered since
the encrypted version of the message was created.
Explanation D. Confidentiality involves sending messages to authorize parties without
unauthorized parties being able to understand it.
3. Review Question p. 2
Answers: A
Explanation A. The only incorrect element listed is symmetric keys. This is because
PKI uses asymmetric (public/private) key pairs for encryption.
Explanation B. PKI (Public Key Infrastructure) is a combination of software,
encryption technologies and services that enable enterprises to protect the security of
communication and business transactions along with proprietary data. The goals of PKI
are: authenticate identity, verify integrity, ensure privacy, authorize access, authorize
transactions, and support non-repudiation.
Explanation C. PKI (Public Key Infrastructure) is a combination of software,
encryption technologies and services that enable enterprises to protect the security of
communication and business transactions along with proprietary data. The goals of PKI
are: authenticate identity, verify integrity, ensure privacy, authorize access, authorize
transactions, and support non-repudiation.
Explanation D. PKI (Public Key Infrastructure) is a combination of software,
encryption technologies and services that enable enterprises to protect the security of
communication and business transactions along with proprietary data. The goals of PKI
are: authenticate identity, verify integrity, ensure privacy, authorize access, authorize
transactions, and support non-repudiation.
4. Review Question p. 3
Answers: A
Explanation A. A Certificate Policy is a set of rules issued by a Certificate Authority
(CA)indicating the applicability of a certificate to a class of application(s) with common
security requirements.
Explanation B. A Bridge CA (Certificate Authority) is a trust model that is built with
cross-certificate pairs.
Explanation C. A CRL (Certificate Revocation List) is a list of the certificates that are
not valid, either due to suspension, revocation, etc.
Explanation D. PKIX is the IETF (Internet Engineering Task Force) committee for the
Public Key Infrastructure, as defined under X.509.
5. Review Question p. 3
Answers: A
Explanation A. A CPS (Certificate Practice Statement) is a much more detailed
statement of the procedures and practices used by a certificate authority in managing
certificates than is a Certificate Policy.
Explanation B. A CPS (Certificate Practice Statement) is a much more detailed
statement of the procedures and practices used by a certificate authority in managing
certificates than is a Certificate Policy.
Given this, the statement that a CPS is a much less detailed statement than a Certificate
Policy is 180 degrees from the truth, and therefore an incorrect answer.
Explanation C. Although a CPS is more detailed than a Certificate Policy, the two are
in fact related.
The CPS includes specific information such as how to establish a digital certificate, how
to request a certificate revocation, length of time a certificate is valid, etc. Since all
Certificate Authorities have a CPS, the statement that a CPS is used only outside of
north America is not a correct one.
Explanation D. Since all Certificate Authorities have a CPS, the statement that a CPS is
used only outside of north America is not a correct one.
6. Review Question p. 3
Answers: A
Explanation A. This question becomes an either or choice. Either you have
decentralized management, such as with Pretty Good Privacy (PGP), or you have
centralized management which comes from a Certificate Authority.
Explanation B. This question becomes an either or choice. Either you have
decentralized management, such as with Pretty Good Privacy (PGP), or you have
centralized management which comes from a Certificate Authority.
Explanation C. Horizontal or vertical as terms in a PKI (Public Key Infrastructure) are
simple distracters and incorrect choices.
Explanation D. Horizontal or vertical as terms in a PKI (Public Key Infrastructure) are
simple distracters and incorrect choices.