Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security + Cert Prep 3 Part 1 (Answered) 100% Correct. Updated Fall 2024/2025.

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
27-08-2024
Written in
2024/2025

CompTIA Security + Cert Prep 3 Part 1 (Answered) 100% Correct. Updated Fall 2024/2025.

Institution
Course

Content preview

CompTIA Security + Cert Prep 3 Part 1
(Answered) 100% Correct. Updated Fall
2024/2025.
encryption

converts information from plaintext into ciphertext
-protects sensitive information from unauthorized disclosure

cryptography

the use of mathematical algorithms to transform information into an encrypted form that is not readable
by unauthorized individuals

decryption

converts ciphertext messages back to plaintext form

Input: P, the plaintext message
Input: K, the encryption key
perform encryption with the P and K
Output: C, the encrypted ciphertext

Encryption algorithm

Input: C, the ciphertext
Input: K, the decryption key
perform decryption steps using C and K
Output: P, the plaintext message

decryption algorithm

symmetric encryption

also known as shared secret encryption algorithms
encryption and decryption use the same shared secret key

asymmetric encryption

also known as public key cryptography
encryption and decryption use different keys from the same pair

asymmetric cryptography

anything encrypted with one key from a pair can be decrypted with the other key from that same pair
-uses key pairs
-non repudiation

, public key

freely distributed to communications partners

private key

kept secret, used to decrypt

confidentiality, integrity, authentication, obfuscation, non-repudiation

5 goals of cryptography

confidentiality

1st goal of cryptography
-no unauthorized access

integrity

2nd goal of cryptography
-no unauthorized changes

authentication

3rd goal of cryptography
-proof of identity claims

obfuscation

4th goal of cryptography
-hiding sensitive data and source code
-unintelligible

non repudiation

5th goal of cryptography
-verification of origin
-only possible with asymmetric cryptography

data at rest

data stored on a hard drive or other storage

data in transit

data transmitted over a network connection

data in use

data processed actively in memory

code

a system that substitute one word or phrase for another

Written for

Course

Document information

Uploaded on
August 27, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICAIDSTORE Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
1211
Member since
4 year
Number of followers
892
Documents
12012
Last sold
1 week ago
ACADEMICAID STORE

Welcome to ACADEMICAID store! We specialize in reliable test banks, exam questions with verified answers, practice exams, study guides, and complete exam review materials to help students pass on the first try. Our uploads support Nursing programs, professional certifications, business courses, accounting classes, and college-level exams. All documents are well-organized, accurate, exam-focused, and easy to follow, making them ideal for quizzes, midterms, finals, ATI & HESI prep, NCLEX-style practice, certification exams, and last-minute reviews. If you’re looking for trusted test banks, comprehensive exam prep, and time-saving study resources, you’re in the right place.

Read more Read less
4.1

176 reviews

5
98
4
29
3
28
2
6
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions