exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 239 discussion

Actual exam question from CompTIA's CAS-004
Question #: 239
Topic #: 1
[All CAS-004 Questions]

A security engineer is implementing a server-side TLS configuration that provides forward secrecy and authenticated encryption with associated data. Which of the following algorithms, when combined into a cipher suite, will meet these requirements? (Choose three.)

  • A. EDE
  • B. CBC
  • C. GCM
  • D. AES
  • E. RSA
  • F. RC4
  • G. ECDSA
  • H. DH
Show Suggested Answer Hide Answer
Suggested Answer: CDG 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cock
Highly Voted 1 year, 10 months ago
Selected Answer: CDG
Forward secrecy is a feature that ensures that encrypted communications are secure even if the private keys are compromised in the future. Authenticated encryption with associated data (AEAD) is a mode of encryption that provides confidentiality, integrity, and authenticity. GCM (Galois/Counter Mode) is a block cipher mode that provides AEAD encryption, authenticity, and integrity. AES (Advanced Encryption Standard) is a symmetric block cipher algorithm used in GCM mode for providing encryption. ECDSA (Elliptic Curve Digital Signature Algorithm) is a public-key cryptographic algorithm used to provide authentication.
upvoted 8 times
...
3041b53
Most Recent 3 days, 2 hours ago
Selected Answer: CDG
DH on its own does not inherently have forward secrecy; to achieve forward secrecy, a system would need to utilize a key exchange mechanism like Diffie-Hellman, specifically in its "ephemeral" mode (DHE or ECDHE), which generates unique session keys for each connection, preventing past communication from being compromised even if a long-term private key is breached
upvoted 1 times
...
deeden
1 month ago
Selected Answer: CDH
ECDSA (Elliptic Curve Digital Signature Algorithm): Used for digital signatures, not for encryption or key exchange.
upvoted 1 times
...
Bright07
1 month, 1 week ago
Selected Answer: CDH
To meet the requirements of forward secrecy and authenticated encryption with associated data, the following algorithms should be combined: C. GCM — Provides authenticated encryption with associated data (AEAD), ensuring both confidentiality and integrity. D. AES — A strong block cipher that, when used with GCM, provides the encryption layer. H. DH — Provides ephemeral key exchange for forward secrecy (use ECDHE for elliptic curve variant). And not G. ECDSA (Elliptic Curve Digital Signature Algorithm) Explanation: ECDSA is a public key signature algorithm, used for digital signatures rather than key exchange. While it can be used for authentication and integrity checking, it does not directly provide forward secrecy. However, ECDSA can be used as part of a cipher suite when paired with an appropriate key exchange mechanism (like ECDHE). It is not a key exchange algorithm on its own.
upvoted 1 times
...
IT_Master_Tech
3 months ago
ChatGPT goes with C, D and H.
upvoted 2 times
...
23169fd
5 months, 3 weeks ago
Selected Answer: CDH
While ECDSA (Elliptic Curve Digital Signature Algorithm) is important for digital signatures and ensuring data integrity and authenticity, it does not contribute to forward secrecy. Therefore, for the specific requirement of forward secrecy and AEAD, DH (or its elliptic curve variant ECDHE) is the appropriate choice.
upvoted 3 times
...
23169fd
6 months ago
Selected Answer: CDG
ECDSA (Elliptic Curve Digital Signature Algorithm): Provides efficient and secure digital signatures, which are crucial for server authentication. GCM (Galois/Counter Mode): Provides authenticated encryption with associated data (AEAD). AES (Advanced Encryption Standard): A widely used and strong encryption standard.
upvoted 1 times
...
EAlonso
6 months ago
Sorry, ECDSA does not has DH.
upvoted 1 times
...
EAlonso
6 months ago
CDG, Diffie-Hellman is in ECDSA.
upvoted 1 times
...
ninjachuleta
7 months, 1 week ago
Selected Answer: CDG
To achieve forward secrecy and authenticated encryption with associated data (AEAD), the security engineer should choose the following algorithms: C. GCM (Galois/Counter Mode): GCM provides authenticated encryption with associated data (AEAD) and is widely used for its efficiency and security. D. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used in conjunction with GCM for AEAD. G. ECDSA (Elliptic Curve Digital Signature Algorithm): ECDSA is commonly used for digital signatures in TLS, providing authentication and integrity.
upvoted 1 times
ninjachuleta
7 months, 1 week ago
Explanation: A. EDE: EDE (Encrypt-Decrypt-Encrypt) is a mode of operation for block ciphers, not an encryption algorithm itself. B. CBC (Cipher Block Chaining): CBC is a mode of operation for block ciphers that does not provide authenticated encryption with associated data (AEAD). E. RSA: RSA is an asymmetric encryption algorithm commonly used for key exchange and digital signatures in TLS but does not directly provide authenticated encryption with associated data (AEAD). F. RC4: RC4 is a stream cipher and is not recommended for use in TLS due to security vulnerabilities. H. DH (Diffie-Hellman): Diffie-Hellman is a key exchange algorithm that can provide forward secrecy when used in conjunction with symmetric encryption, but it does not directly provide authenticated encryption with associated data (AEAD).
upvoted 1 times
...
...
ThatGuyOverThere
1 year, 2 months ago
Selected Answer: CDH
Pretty confident on this one. You would not use ECDSA (Elliptic Curve Digital Signature Algorithm) in this situation. That is for digital signatures and not for sending data. DH when using its ephemeral form (EDH or DHE) would provide forward secrecy. RSA would not be used in conjunction with AES, it would be either or.
upvoted 4 times
ThatGuyOverThere
1 year, 2 months ago
Yea don't listen to this. Did not do enough research.
upvoted 2 times
ThatGuyOverThere
1 year, 2 months ago
Even though my comments about ECDSA are wrong. I still think CDH is the best answer, though I think the answers for the question are too confusing. They should have combined AES and GCM to one answer and they should have changed DH to ECDHE
upvoted 1 times
ddcnsd65
9 months, 1 week ago
DH was developed specifically for "key exchange" and not for data encryption or digital signatures. It was designed to allow two users to exchange a secret key over an insecure channel without any prior communication.
upvoted 1 times
...
...
...
...
Ariel235788
1 year, 3 months ago
Selected Answer: CDE
To achieve forward secrecy and authenticated encryption with associated data (AEAD), you should use modern and secure cipher suites. Here are three algorithms that, when combined into a cipher suite, meet these requirements: C. GCM (Galois/Counter Mode): GCM provides both authenticated encryption and the ability to achieve forward secrecy when used with appropriate key exchange mechanisms like ECDHE or DHE. D. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used with AEAD cipher suites. E. RSA (Rivest–Shamir–Adleman): While RSA is not typically used for forward secrecy, it can be used for authentication in conjunction with other algorithms that provide forward secrecy.
upvoted 1 times
Ariel235788
1 year, 3 months ago
why the others are incorrect: A. EDE (Encrypt-Decrypt-Encrypt): EDE is a mode of operation for block ciphers, and it's not commonly used in TLS cipher suites. B. CBC (Cipher Block Chaining): CBC is an older mode of operation with known security vulnerabilities, and it is not recommended for modern TLS cipher suites. F. RC4 (Rivest Cipher 4): RC4 is a stream cipher with significant security weaknesses and should not be used in modern TLS configurations.
upvoted 1 times
Ariel235788
1 year, 3 months ago
Changing my answer; To achieve forward secrecy and authenticated encryption with associated data (AEAD) in a TLS configuration, you should use modern and secure cipher suites. Here are three algorithms that, when combined into a cipher suite, meet these requirements: GCM (Galois/Counter Mode): GCM provides both authenticated encryption and the ability to achieve forward secrecy when used with appropriate key exchange mechanisms like ECDHE or DHE. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used with AEAD cipher suites. ECDHE (Elliptic Curve Diffie-Hellman Ephemeral): ECDHE is a key exchange algorithm that provides forward secrecy when combined with GCM or AES for encryption. CDG is correct, i didnt upload all the answer choices in my ChatGPT query
upvoted 1 times
...
...
...
Alizadeh
1 year, 4 months ago
Selected Answer: CDH
The correct answers are C, D, and H.
upvoted 2 times
...
javier051977
1 year, 9 months ago
Selected Answer: CDH
The three algorithms that, when combined into a cipher suite, provide forward secrecy and authenticated encryption with associated data are: C. GCM (Galois/Counter Mode) D. AES (Advanced Encryption Standard) H. DH (Diffie-Hellman) ECDSA is an algorithm used for digital signatures and is not directly related to encryption, so it cannot be used for authenticated encryption with associated data. It is typically used in TLS for certificate signing and verification. Therefore, ECDSA cannot be used to meet the requirements of forward secrecy and authenticated encryption with associated data in the given scenario.
upvoted 2 times
BreakOff874
1 year, 8 months ago
This is from the book, page 216: DH by itself does not provide any authentication mechanism and so cannot adequately identify if the other party is really who they claim to be without utilizing an authentication mechanism in parallel.
upvoted 2 times
...
...
WHODISNEWFONE
1 year, 10 months ago
Selected Answer: CDG
Answer is C,D,G
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago