Question: Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt

Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt the message. Which of the following would be a suitable option for an encryption algorithm that meets her request?

a. SHA-3
b. RSA
c. 3DES
d. MD5

David has discovered a file containing encrypted passwords on the server. Which of the following is the most likely algorithm used to perform the encryption on the passwords?

a. AES
b. SHA-3
c. RSA
d. 3DES

Jessica would like to implement cryptography. Which of the following protections does cryptography not provide?

a. Integrity
b. Authentication
c. Confidentiality
d. Authorization

Lisa asks you for a recommendation of a way that she can confirm her identity to others and prove the integrity of the messages she sends. What would you recommend that Lisa requests?

a. Digital signature
b. Ephemeral keys
c. RSA certificate
d. Private key

In a recent attack on your company network, an attacker used backwards compatibility of an SHA algorithm to force your server to use SHA-2 keys instead of SHA-3, and then used the vulnerability to gain access to the system. Which of the following was the attacker performing?

a. Downplay attack
b. Birthday attack
c. Downgrade attack
d. Collision attack

Your company has decided to implement a new supply-chain system where all vendors will share a single ledger with the company, instead of duplicate ledgers where mistakes may be made. Which of the following is being implemented?

a. Advanced Encryption Standard (AES)
b. Asymmetric cryptography
c. SHA-256
d. Blockchain

Charles wants to perform software-based encryption on his files without downloading or purchasing an additional product. Which of the following is not an option for him?

a. VeraCrypt
b. FileVault
c. Encrypting File System (EFS)
d. BitLocker

Margaret's laptop has a failed motherboard. When you remove her hard drive and place it in another computer, the hard drive fails to boot. You also receive a message about a missing TPM chip. Which of the following has been implemented on Margaret's hard drive?

a. BitLocker
b. FileVault
c. Encrypting File System (EFS)
d. VeraCrypt

Your chief information security officer (CISO) is concerned about the security of IoT devices on your network. Which of the following is not a cryptography limitation of IoT devices?

a. Low latency
b. Low capacity
c. Low power
d. Strong security

Anthony would like to verify that his downloaded file has not been damaged while in transit. Which of the following would you recommend that Anthony use to verify the file's integrity?

a. Quantum cryptography
b. Symmetric cryptography
c. Asymmetric cryptography
d. Hashing algorithms

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!