Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-501 topic 1 question 954 discussion

Actual exam question from CompTIA's SY0-501
Question #: 954
Topic #: 1
[All SY0-501 Questions]

Which of the following algorithms would be used to provide non-repudiation of a file transmission?

  • A. AES
  • B. RSA
  • C. MD5
  • D. SHA
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jerryhungcc
Highly Voted 3 years, 4 months ago
RSA DIGITAL SIGNATURES A digital signature is used to prove the identity of the sender of a message and to show that a message has not been tampered with since the sender posted it. This provides authentication, integrity, and non-repudiation. To create a digital signature using RSA encryption, the private key is used to encrypt the signature; the public key is distributed to allow others to read it. I think answer is b.RSA.
upvoted 11 times
...
WillGTechDaily
Highly Voted 3 years, 4 months ago
Guys/Gals , RSA Is used for encryption not integrity , integrity = hashing = MD5 Encryption = Confidentiality RSA is widely used for key exchange, encryption, and digital signatures
upvoted 7 times
Bisibaby
3 years, 4 months ago
Hi WillGTechDaily,I think you should read the question again. The question asked about non-repudiation of data. Hashing and Encryption can't be used to achieve that . It's only digital signature .Hence ,the reason for RSA
upvoted 2 times
...
Heymannicerouter
2 years, 10 months ago
Question is about non-repudiation and digital signatures provide that.
upvoted 3 times
...
...
mlonz
Most Recent 2 years, 8 months ago
Integrity = hashing, RSA is asymmetric algorithm Experts discovered significant vulnerabilities in MD5 in 2004 and later years Security experts now consider it cracked and discourage its use. However, it is still widely used to verify the integrity of files. "DARRYL GIBSONs Book"
upvoted 1 times
...
KenCW
2 years, 8 months ago
Non-repudiaton=Digital Signature, digital signature uses asymmetric cryptography to achieve integrity, authentication and non-repudiation. B. RSA
upvoted 2 times
...
fury247
2 years, 9 months ago
Hash values are also useful for verifying the INTEGRITY of data sent through insecure channels. So MD5 and SHA hash is ruled out. Non-repudiation = digital signatures, RSA provides that
upvoted 1 times
...
Dubbsnix
2 years, 11 months ago
It’s RSA a two second google search proves this
upvoted 3 times
...
deb123
2 years, 11 months ago
Providing end-to-end file non-repudiation requires using a secure file transfer server that can perform file integrity checking, The cryptographically valid SHA1 and MD5 algorithms are widely used to do file integrity checking. SHA1 is the stronger of these, and is approved for file integrity checking since SHA1 is not one of the option, the next best is MD5 - (C)
upvoted 1 times
...
Cryptomike87
2 years, 11 months ago
KEY “file transmission”. It’s MD5
upvoted 1 times
...
Aarongreene
2 years, 11 months ago
jason dion in his notes. Digital signature use either DSA,RSA,ECDSA, or SHA. To prevent spoofing of a message integrity. I am thinking it is RSA
upvoted 1 times
...
simo77
2 years, 11 months ago
we are talking about non repudiation for a file transferring means the file integrity MD5 is correct
upvoted 3 times
Heymannicerouter
2 years, 10 months ago
Why is MD5 a better answer then SHA?
upvoted 3 times
...
...
L1singh
3 years ago
answer is RSA. As the answer can't be MD5, MD5 isn't as secure as SHA, if it was purely a hashing algorithm the chosen answer would have been SHA not MD5
upvoted 1 times
...
matt9875
3 years, 1 month ago
Non-repudiation is the ability to prove that the file uploaded and the file downloaded are identical. The cryptographically valid SHA1 and MD5 algorithms are widely used to do file integrity checking. MD5 makes sense here.
upvoted 3 times
[Removed]
3 years ago
100% agreed.
upvoted 1 times
...
Hash___
2 years, 11 months ago
Oh boy... This is definitely not Non-Repudiation. What you just defined is integrity, which SHA1 and MD5 are good for. But the questions doesn't ask about integrity. "Non-repudiation involves associating actions or changes with a unique individual."
upvoted 4 times
...
Heymannicerouter
2 years, 10 months ago
SHA is better than MD5 though
upvoted 2 times
...
...
Matrix141
3 years, 1 month ago
RSA -> Digital Signatures -> non-repudiation
upvoted 3 times
...
mcNik
3 years, 1 month ago
They specifically ask abt fie transmission , check this https://www.ipswitch.com/resources/best-practices/file-non-repudiation
upvoted 1 times
...
lsy
3 years, 2 months ago
should be B RSA is the most widely used asymmetric algorithm: It provides a method to assure the confidentiality, integrity, authenticity, and non-repudiation of electronic communications and data storage.
upvoted 1 times
...
who__cares123456789___
3 years, 2 months ago
If you read this, you will be lead to see C. MD5 is correct, since SHA (aka SHA-1) has been shunned from service? Non-repudiation Techniques: For email transmission, non-repudiation typically involves using methods designed to ensure that a sender can’t deny having sent a particular message, or that a message recipient can’t deny having received it. Techniques would include email tracking. Cryptographic hash functions may be used to establish the integrity of transmitted documents. No encryption keys are involved, and strong hash functions are designed to be irreversible. Moreover, they’re designed to avoid collision, which occurs in the rare cases where two separate documents give rise to the same hash value.
upvoted 3 times
Heymannicerouter
2 years, 10 months ago
SHA-1 has been superseded by SHA-2 and 3, but it's still better than MD5.
upvoted 1 times
...
...
yalight
3 years, 3 months ago
wife...how comptia keep its non-repudiation?
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...