Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Key layering includes which of the following?
Data keys
All of the above
Master keys
Key-encrypting keys
Key layering by definition implies the utilization (or layering) of multiple keys, such that the keys at one layer are used to protect items at a lower level. This constraint is intended to make attacks more difficult, and to limit exposure resulting from compromise of a specific key. Master keys are at the highest level in the hierarchy and not cryptographically protected. They are distributed manually or initially installed and protected by procedural controls and physical or electronic isolation. Key-encrypting keys (aka key-transport keys) are symmetric keys or encryption public keys used for key transport or storage of other keys. Data keys are used to perform cryptographic operations (e.g., encryption, authentication) on user data. These are generally short-term symmetric keys (However, asymmetric signature private keys may also be considered data keys, and these are usually longer-term keys.) Source: http://cacr.uwaterloo.ca/hac/about/chap13.pdf
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.