Question: Learning Objectives Demonstrate knowledge of security concepts. Know how to mitigate security risk through the use of cryptographic controls. Evaluate the scenario Apply knowledge in
Learning Objectives
- Demonstrate knowledge of security concepts.
- Know how to mitigate security risk through the use of cryptographic controls.
- Evaluate the scenario
- Apply knowledge in the given scenario
Instruction
XYZ Network Solutions provides network services and value-add communications to customers in several countries in Europe and North America.
The corporate headquarters is in Miami Florida with offices in Chicago, London, UK and Frankfurt, Germany. The company has a sales division with eight employees led by Andre Wisser, human resources with three employees led by Jane Aubin, Technical and Communications with 45 employees led by Peter ODay. Finance is led by Andrea Worth but most of the Payroll and Finance functions have been outsourced to a SaaS Cloud Provider.
During peer review it would be important to ensure that the answers provided are thorough and address the wide range of issues associated with access control.
5- When an email is encrypted it uses a combination of symmetric and asymmetric algorithms. Why?
6- Which of the following belongs to symmetric algorithms, asymmetric algorithms and hash algorithms: AES, MD4,5, DES, IDEA, RSA, RC4,5,6 RSA MD4,5, Blowfish, Twofish, MARS, ECC, SHA1,256,512, SHA1,256,512, Serpent, Rijndael, ECC, CAST, Keccak (SHA3), Deffie-Hellman, Keccak (SHA3)?
7- Define the following term:
- Plaintext
- Cryptogram
- Workfactor
- Digest
- Cryptanalysis
- Cryptovariable
- Collision
- Kerkhoffs Principle
- Digital signature
- Hybrid encryption
8- What is the relationship between Steganography and Data Loss Prevention (DLP)?
9- What are the advantages and disadvantages of symmetric and asymmetric algorithms?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
