Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt the message. Which of the following would be a suitable option for an encryption algorithm that meets her request?
David has discovered a file containing encrypted passwords on the server. Which of the following is the most likely algorithm used to perform the encryption on the passwords?
Jessica would like to implement cryptography. Which of the following protections does cryptography not provide?
Lisa asks you for a recommendation of a way that she can confirm her identity to others and prove the integrity of the messages she sends. What would you recommend that Lisa requests?
In a recent attack on your company network, an attacker used backwards compatibility of an SHA algorithm to force your server to use SHA-2 keys instead of SHA-3, and then used the vulnerability to gain access to the system. Which of the following was the attacker performing?
Your company has decided to implement a new supply-chain system where all vendors will share a single ledger with the company, instead of duplicate ledgers where mistakes may be made. Which of the following is being implemented?
| a. Advanced Encryption Standard (AES) | | |
| b. Asymmetric cryptography | | |
|
|
Charles wants to perform software-based encryption on his files without downloading or purchasing an additional product. Which of the following is not an option for him?
|
|
| c. Encrypting File System (EFS) | | |
|
Margaret's laptop has a failed motherboard. When you remove her hard drive and place it in another computer, the hard drive fails to boot. You also receive a message about a missing TPM chip. Which of the following has been implemented on Margaret's hard drive?
|
|
| c. Encrypting File System (EFS) | | |
|
Your chief information security officer (CISO) is concerned about the security of IoT devices on your network. Which of the following is not a cryptography limitation of IoT devices?
Anthony would like to verify that his downloaded file has not been damaged while in transit. Which of the following would you recommend that Anthony use to verify the file's integrity?
|
| b. Symmetric cryptography | | |
| c. Asymmetric cryptography | | |
|