{"id":672,"date":"2021-01-17T05:37:41","date_gmt":"2021-01-16T18:04:03","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0664\/"},"modified":"2021-01-17T05:44:32","modified_gmt":"2021-01-17T05:44:32","slug":"systems-security-certified-practitioner-sscp-question0664","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0664\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0664"},"content":{"rendered":"<div class=\"question\">Kerberos depends upon what encryption method? <br \/><strong><br \/>A.<\/strong> Public Key cryptography. <br \/><strong>B.<\/strong> Secret Key cryptography. <br \/><strong>C.<\/strong> El Gamal cryptography. <br \/><strong>D.<\/strong> Blowfish cryptography.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nKerberos depends on Secret Keys or Symmetric Key cryptography.<br \/>\nKerberos a third party authentication protocol. It was designed and developed in the mid 1980&#8217;s by MIT. It is considered open source but is copyrighted and owned by MIT. It relies on the user&#8217;s secret keys. The password is used to encrypt and decrypt the keys.<br \/>\nThis question asked specifically about encryption methods. Encryption methods can be SYMMETRIC (or secret key) in which encryption and decryption keys are the same, or ASYMMETRIC (aka &#8216;Public Key&#8217;) in which encryption and decryption keys differ.<br \/>\n&#8216;Public Key&#8217; methods must be asymmetric, to the extent that the decryption key CANNOT be easily derived from the encryption key. Symmetric keys, however, usually encrypt more efficiently, so they lend themselves to encrypting large amounts of data. Asymmetric encryption is often limited to ONLY encrypting a symmetric key and other information that is needed in order to decrypt a data stream, and the remainder of the encrypted data uses the symmetric key method for performance reasons. This does not in any way diminish the security nor the ability to use a public key to encrypt the data, since the symmetric key method is likely to be even MORE secure than the asymmetric method.<br \/>\nFor symmetric key ciphers, there are basically two types: BLOCK CIPHERS, in which a fixed length block is encrypted, and STREAM CIPHERS, in which the data is encrypted one &#8216;data unit&#8217; (typically 1 byte) at a time, in the same order it was received in.<br \/>\nThe following answers are incorrect:<br \/>\nPublic Key cryptography. Is incorrect because Kerberos depends on Secret Keys or Symmetric Key cryptography and not Public Key or Asymmetric Key cryptography.<br \/>\nEl Gamal cryptography. Is incorrect because El Gamal is an Asymmetric Key encryption algorithm. Blowfish cryptography. Is incorrect because Blowfish is a Symmetric Key encryption algorithm.<br \/>\nReferences: OIG CBK Access Control (pages 181 -184) AIOv3 Access Control (pages 151 -155)<br \/>\nWikipedia <a href=\"http:\/\/en.wikipedia.org\/wiki\/Blowfish_%28cipher%29\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/en.wikipedia.org\/wiki\/Blowfish_%28cipher%29<\/a> ; <a href=\"http:\/\/en.wikipedia.org\/wiki\/El_Gamal\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/en.wikipedia.org\/wiki\/El_Gamal<\/a> <a href=\"http:\/\/www.mrp3.com\/encrypt.html\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.mrp3.com\/encrypt.html<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kerberos depends upon what encryption method? A. Public Key cryptography. B. Secret Key cryptography. C. El Gamal cryptography. D. Blowfish cryptography. Show Answer Hide Answer Correct Answer: B Explanation: Kerberos depends on Secret Keys or Symmetric Key cryptography. Kerberos a third party authentication protocol. It was designed and developed in the mid 1980&#8217;s by MIT. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,667,3],"class_list":["post-672","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0664","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"predecessor-version":[{"id":1748,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/672\/revisions\/1748"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}