Kleopatra was used to generate asymmetric encryption keys.
Web of Trust is used to trust PKI public keys when the keys were not issued by a Certificate Authority.
How many encryption keys are required to encrypt and decrypt information using a symmetric encryption algorithm?
Asymmetric encryption can use either the public key or the private key to encrypt an email message.
You need to ensure both confidentiality and sender authenticity (non-repudiation) for an important email giving direction to a sub-contractor. Choose the correct options for encrypting this message using the public/private keys for the sender and recipient (Choose all that apply).
|Bob (the sender) encrypts the message with Alice’s (the recipient’s) private key to ensure confidentiality (Alice is the only recipient who will be able to read the message).|
|Bob, the sender, encrypts the message with Alice, the recipient’s, public key to prove his identity (sender authenticity).|
|Bob (the sender) encrypts the message with Alice’s (the recipient’s) public key to ensure confidentiality (only the intended receipient will be able to read the message).|
|Bob, the sender, encrypts the message with his private key. Alice, the recipient, decrypts the message using Bob’s (sender’s) public key. Successful decryption proves the message was sent to Alice by Bob.|
A cryptographic hash function, e.g. MD5 or SHA-1, is used to verify ____________ for a file.
A ZIP file is a file archive that uses a compression algorithm to reduce the amount of storage required for each file. This reduces the overall size of the archive file as well. Another benefit of file compression is that it provides confidentiality for the archive contents by making the files unreadable by an attacker.
A system administrator needs to verify that all files in a downloaded software delivery package are identical and unchanged from the vendor’s original files. What actions should be taken by the administrator?
|Compute the MD5 and SHA-1 hash values for the downloaded files.|
|Compare the vendor’s hash values for the software files to hash values computed for the downloaded files from the delivery package.|
|Compare the hash values of the downloaded files to the hash values listed in the vendor’s digital certificate.|
|Download the files again from the vendor’s Web site but use SSL this time to ensure that the files are not changed during download.|
What is an encryption key?
|An encryption key is a numeric value used to unlock a computer workstation.|
|An encryption key is used to hide information in a stream of bits and bytes.|
|An encryption key is a numeric value input to an encryption algorithm.|
|An encryption key is a text string that uniquely identifies its owner.|
X.509 digital certificates are used to transfer and store what types of encryption keys?
|a pair of symmetric keys which can be used to validate the digital certificate|
|digital certificates do not contain any encryption keys|
|the certificate issuer’s private key|
|public key for the owner’s public/private key pair|