exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 256 discussion

Actual exam question from CompTIA's CAS-004
Question #: 256
Topic #: 1
[All CAS-004 Questions]

A security architect updated the security policy to require a proper way to verify that packets received between two parties have not been tampered with and the connection remains private. Which of the following cryptographic techniques can be used to ensure the security policy is being enforced properly?

  • A. MD5-based envelope method
  • B. HMAC_SHA256
  • C. PBKDF2
  • D. PGP
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
p1s3c
Highly Voted 12 months ago
Selected Answer: B
The cryptographic technique that can be used to ensure the security policy is being enforced properly is HMAC_SHA256. It is a type of message authentication code (MAC) that is computed using a cryptographic hash function in combination with a secret key. HMAC_SHA256 can be used to verify the integrity and authenticity of a message and to ensure that the connection remains private. It is commonly used in secure communication protocols such as TLS/SSL. Option A (MD5-based envelope method) is not a commonly used cryptographic technique and is not a suitable choice for ensuring the security policy. Option C (PBKDF2) is a key derivation function used to derive a cryptographic key from a password. It is not suitable for ensuring the integrity and authenticity of packets exchanged between two parties. Option D (PGP) is a public key encryption program used to encrypt and decrypt files and emails. While it provides a level of security, it is not the best choice for verifying the integrity and authenticity of packets exchanged between two parties.
upvoted 10 times
...
joinedatthehop
Most Recent 7 months, 2 weeks ago
Selected Answer: B
HMAC-SHA256 offers several advantages over other signature calculation methods. Firstly, it provides a high level of security due to the strength of the SHA-256 hash function. It is practically impossible to reverse-engineer the original message from its hash value.
upvoted 2 times
...
BiteSize
9 months, 3 weeks ago
Selected Answer: B
Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 4 times
...
last_resort
1 year ago
Selected Answer: D
PGP uses encryption and integrity mechanisms
upvoted 1 times
last_resort
1 year ago
I recant....HMAC_SHA256
upvoted 6 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago