Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt

Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt the message. Which of the following would be a suitable option for an encryption algorithm that meets her request?

a. SHA-3
b. RSA
c. 3DES
d. MD5

David has discovered a file containing encrypted passwords on the server. Which of the following is the most likely algorithm used to perform the encryption on the passwords?

a. AES
b. SHA-3
c. RSA
d. 3DES

Jessica would like to implement cryptography. Which of the following protections does cryptography not provide?

a. Integrity
b. Authentication
c. Confidentiality
d. Authorization

Lisa asks you for a recommendation of a way that she can confirm her identity to others and prove the integrity of the messages she sends. What would you recommend that Lisa requests?

a. Digital signature
b. Ephemeral keys
c. RSA certificate
d. Private key

In a recent attack on your company network, an attacker used backwards compatibility of an SHA algorithm to force your server to use SHA-2 keys instead of SHA-3, and then used the vulnerability to gain access to the system. Which of the following was the attacker performing?

a. Downplay attack
b. Birthday attack
c. Downgrade attack
d. Collision attack

Your company has decided to implement a new supply-chain system where all vendors will share a single ledger with the company, instead of duplicate ledgers where mistakes may be made. Which of the following is being implemented?

a. Advanced Encryption Standard (AES)
b. Asymmetric cryptography
c. SHA-256
d. Blockchain

Charles wants to perform software-based encryption on his files without downloading or purchasing an additional product. Which of the following is not an option for him?

a. VeraCrypt
b. FileVault
c. Encrypting File System (EFS)
d. BitLocker

Margaret's laptop has a failed motherboard. When you remove her hard drive and place it in another computer, the hard drive fails to boot. You also receive a message about a missing TPM chip. Which of the following has been implemented on Margaret's hard drive?

a. BitLocker
b. FileVault
c. Encrypting File System (EFS)
d. VeraCrypt

Your chief information security officer (CISO) is concerned about the security of IoT devices on your network. Which of the following is not a cryptography limitation of IoT devices?

a. Low latency
b. Low capacity
c. Low power
d. Strong security

Anthony would like to verify that his downloaded file has not been damaged while in transit. Which of the following would you recommend that Anthony use to verify the file's integrity?

a. Quantum cryptography
b. Symmetric cryptography
c. Asymmetric cryptography
d. Hashing algorithms

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle 12c SQL

Authors: Joan Casteel

3rd edition

1305251032, 978-1305251038

More Books

Students also viewed these Databases questions

Question

=+15. Did you create a campaign that would create buzz?

Answered: 1 week ago

Question

LO1 Summarize the organizations strategic planning process.

Answered: 1 week ago