Encryption and Key Management
Managing encryption keys securely
Encryption and Key Management are critical aspects of cybersecurity covered in the CompTIA Security+ certification. Encryption transforms readable data (plaintext) into unreadable format (ciphertext) using mathematical algorithms and keys. This protects confidentiality of data both at rest and in …
Concepts covered: Key Exchange, Certificate Authorities, Elliptic Curve Cryptography, Block Ciphers, Digital Certificates, Key Management, Cryptographic Hardware and HSMs, Cryptographic Key Length, Stream Ciphers, Cryptographic Hash Functions, Cryptographic Protocol, Key Length and Strength
CompTIA Security+ - Encryption and Key Management Example Questions
Test your knowledge of Encryption and Key Management
Question 1
A web application needs to store user passwords securely. The developers are looking to implement a hashing function that provides strong resistance against dictionary attacks and rainbow tables. Which of the following hashing techniques should they incorporate?
Question 2
A company wants to use a Hardware Security Module (HSM) to protect sensitive information. What security feature does the HSM use to defend against physical tampering?
Question 3
A company decides to use a stream cipher for their wireless network communications. What must they ensure to maintain the confidentiality of the transmitted data?