Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?

IT Questions BankCategory: CCNA SecurityWhich characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?

Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?

  • exchange
  • generation
  • verification
  • revocation and destruction

Explanation: To make a key strong, there are several essential characteristics of key management that should be considered:

  • Generation - The use of good random number generators is needed to ensure that all keys are likely to be equally generated so that the attacker cannot predict which keys are more likely to be used.
  • Verification - Almost all cryptographic algorithms have some weak keys that should not be used. With the help of key verification procedures, these keys can be regenerated if they occur.
  • Exchange - Key management procedures should provide a secure key exchange mechanism that allows secure agreement on the keying material with the other party, probably over an untrusted medium.
  • Revocation and Destruction - Revocation notifies all interested parties that a certain key has been compromised and should no longer be used. Destruction erases old keys in a manner that prevents malicious attackers from recovering them.

Exam with this question: Module 16: Quiz – Basic Integrity and Authenticity Network Security
Exam with this question: CCNA Security Chapter 7 Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x