Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CAS-004 topic 1 question 370 discussion

Actual exam question from CompTIA's CAS-004
Question #: 370
Topic #: 1
[All CAS-004 Questions]

A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file. Which of the following is the BEST way for the security team to comply with this requirement?

  • A. Digital signature
  • B. Message hash
  • C. Message digest
  • D. Message authentication code
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
armid
2 days, 5 hours ago
Selected Answer: D
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message. In other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed (its integrity). The MAC value allows verifiers (who also possess a secret key) to detect any changes to the message content. Informally, a message authentication code system consists of three algorithms: A key generation algorithm selects a key from the key space uniformly at random. A signing algorithm efficiently returns a tag given the key and the message. A verifying algorithm efficiently verifies the authenticity of the message given the same key and the tag. That is, return accepted when the message and tag are not tampered with or forged, and otherwise return rejected.
upvoted 1 times
armid
4 hours, 39 minutes ago
After more research I think A is better. With HMAC there would have to be a mechanism to exchange shared key
upvoted 1 times
...
...
OdinAtlasSteel
8 months ago
Selected Answer: A
A digital signature is the most comprehensive solution as it addresses both file integrity and sender authenticity, making it the best choice for compliance with the requirement.
upvoted 1 times
...
ThatGuyOverThere
8 months ago
Selected Answer: A
I think the others verify data integrity but not sender authenticity.
upvoted 2 times
...
oskinoo
8 months, 1 week ago
Selected Answer: B
The best option for the MSSP to configure to meet this objective is RSA (Option B). RSA (Rivest-Shamir-Adleman) is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm, meaning it uses two different keys: one public key for encryption and one private key for decryption. This is ideal for secure communications as the public key can be distributed widely while the private key remains secret. RSA is widely used in electronic commerce protocols and is considered secure when used properly. It’s also recognized and accepted by many government standards, making it suitable for a client with government compliance requirements.
upvoted 1 times
oskinoo
8 months, 1 week ago
Sorry, this was an answer to the next question. remove
upvoted 4 times
...
...
oskinoo
8 months, 1 week ago
Selected Answer: A
The best way for the security team to comply with this requirement is through a Digital Signature (Option A). A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. It provides a layer of validation and security to messages sent through a non-secure channel. Digital signatures can provide evidence of origin, identity and status of an electronic document, transaction or message and can acknowledge informed consent by the signer. In many countries, including the United States, digital signatures are considered legally binding in the same way as traditional document signatures. This makes them an ideal choice for verifying the integrity of a downloaded file and the sender of the file
upvoted 1 times
...
POWNED
8 months, 2 weeks ago
Selected Answer: A
I agree with A, if the question did not involve the integrity of the sender of the file, and just the integrity of the data I would go with hash.
upvoted 1 times
...
weaponxcel
8 months, 2 weeks ago
Selected Answer: D
A. Digital signature. It provides both the needed data integrity and sender authentication using asymmetric cryptography, ensuring compliance with the stated requirement.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in