SlideShare a Scribd company logo
1 of 2
Jennifer would like to send an encrypted message to Robert. She wants to send him a different
key from the one she used to encrypt the message. Which of the following would be a suitable
option for an encryption algorithm that meets her request?
David has discovered a file containing encrypted passwords on the server. Which of the
following is the most likely algorithm used to perform the encryption on the passwords?
Jessica would like to implement cryptography. Which of the following protections does
cryptography not provide?
Lisa asks you for a recommendation of a way that she can confirm her identity to others and
prove the integrity of the messages she sends. What would you recommend that Lisa requests?
In a recent attack on your company network, an attacker used backwards compatibility of an
SHA algorithm to force your server to use SHA-2 keys instead of SHA-3, and then used the
vulnerability to gain access to the system. Which of the following was the attacker performing?
Your company has decided to implement a new supply-chain system where all vendors will
share a single ledger with the company, instead of duplicate ledgers where mistakes may be
made. Which of the following is being implemented?
Charles wants to perform software-based encryption on his files without downloading or
purchasing an additional product. Which of the following is not an option for him?
Margaret's laptop has a failed motherboard. When you remove her hard drive and place it in
another computer, the hard drive fails to boot. You also receive a message about a missing TPM
chip. Which of the following has been implemented on Margaret's hard drive?
Your chief information security officer (CISO) is concerned about the security of IoT devices on
your network. Which of the following is not a cryptography limitation of IoT devices?
Anthony would like to verify that his downloaded file has not been damaged while in transit.
Which of the following would you recommend that Anthony use to verify the file's integrity?
a. SHA-3
b. RSA
c. 3DES
d. MD5
Jennifer would like to send an encrypted message to Robert- She wants.docx

More Related Content

Similar to Jennifer would like to send an encrypted message to Robert- She wants.docx

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Josh Sokol
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
Tiffany Sandoval
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
Editor Jacotech
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
Kunal Sharma
 

Similar to Jennifer would like to send an encrypted message to Robert- She wants.docx (20)

Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Stop Malware Forever
Stop Malware ForeverStop Malware Forever
Stop Malware Forever
 
Security threats
Security threatsSecurity threats
Security threats
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking   Chapter 12 - Encryption - Eric VanderburgEthical hacking   Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from DanrLjAbrahamw

Introduction- Splunk is a leading software platform for collecting- in.docx
Introduction- Splunk is a leading software platform for collecting- in.docxIntroduction- Splunk is a leading software platform for collecting- in.docx
Introduction- Splunk is a leading software platform for collecting- in.docx
DanrLjAbrahamw
 

More from DanrLjAbrahamw (20)

Joyce- who was on her third maternity leave- requested permission to t.docx
Joyce- who was on her third maternity leave- requested permission to t.docxJoyce- who was on her third maternity leave- requested permission to t.docx
Joyce- who was on her third maternity leave- requested permission to t.docx
 
Jonathan Corporation purchased debt securities during 2021 and classif.docx
Jonathan Corporation purchased debt securities during 2021 and classif.docxJonathan Corporation purchased debt securities during 2021 and classif.docx
Jonathan Corporation purchased debt securities during 2021 and classif.docx
 
Johnson Products eamed $5-28 per share last year and paid a dividend o.docx
Johnson Products eamed $5-28 per share last year and paid a dividend o.docxJohnson Products eamed $5-28 per share last year and paid a dividend o.docx
Johnson Products eamed $5-28 per share last year and paid a dividend o.docx
 
Jersal cavity includess - Crarial eauty (hounes the biain't- - Natal c.docx
Jersal cavity includess - Crarial eauty (hounes the biain't- - Natal c.docxJersal cavity includess - Crarial eauty (hounes the biain't- - Natal c.docx
Jersal cavity includess - Crarial eauty (hounes the biain't- - Natal c.docx
 
Javascript Assignment- urgent- Create a basic web page- follow the ins.docx
Javascript Assignment- urgent- Create a basic web page- follow the ins.docxJavascript Assignment- urgent- Create a basic web page- follow the ins.docx
Javascript Assignment- urgent- Create a basic web page- follow the ins.docx
 
Javier volunteers for at most five events each month- He attends exact.docx
Javier volunteers for at most five events each month- He attends exact.docxJavier volunteers for at most five events each month- He attends exact.docx
Javier volunteers for at most five events each month- He attends exact.docx
 
Jane and Bill are apprehended for a bank robbery- They are taken into.docx
Jane and Bill are apprehended for a bank robbery- They are taken into.docxJane and Bill are apprehended for a bank robbery- They are taken into.docx
Jane and Bill are apprehended for a bank robbery- They are taken into.docx
 
Ivanhoe Corporation issued $230-000 of 10 -year bonds at a discount- P.docx
Ivanhoe Corporation issued $230-000 of 10 -year bonds at a discount- P.docxIvanhoe Corporation issued $230-000 of 10 -year bonds at a discount- P.docx
Ivanhoe Corporation issued $230-000 of 10 -year bonds at a discount- P.docx
 
Ivanhoe Co- began operations on July 1 - It uses a perpetual inventory.docx
Ivanhoe Co- began operations on July 1 - It uses a perpetual inventory.docxIvanhoe Co- began operations on July 1 - It uses a perpetual inventory.docx
Ivanhoe Co- began operations on July 1 - It uses a perpetual inventory.docx
 
ITALY GROUP 1) Consider your group country and its trading partners-.docx
ITALY GROUP   1) Consider your group country and its trading partners-.docxITALY GROUP   1) Consider your group country and its trading partners-.docx
ITALY GROUP 1) Consider your group country and its trading partners-.docx
 
It takes ___________ for cells from the stratum basale to reach the la.docx
It takes ___________ for cells from the stratum basale to reach the la.docxIt takes ___________ for cells from the stratum basale to reach the la.docx
It takes ___________ for cells from the stratum basale to reach the la.docx
 
It was also noted in the chapter that perhaps the most damaging for No.docx
It was also noted in the chapter that perhaps the most damaging for No.docxIt was also noted in the chapter that perhaps the most damaging for No.docx
It was also noted in the chapter that perhaps the most damaging for No.docx
 
is value- Cick the leon to view the probabily distribution- Find j-E(x.docx
is value- Cick the leon to view the probabily distribution- Find j-E(x.docxis value- Cick the leon to view the probabily distribution- Find j-E(x.docx
is value- Cick the leon to view the probabily distribution- Find j-E(x.docx
 
Investors should perform ratio analysis to examine company performance.docx
Investors should perform ratio analysis to examine company performance.docxInvestors should perform ratio analysis to examine company performance.docx
Investors should perform ratio analysis to examine company performance.docx
 
Intro to the insurance data The insurance-csv data base contains insur.docx
Intro to the insurance data The insurance-csv data base contains insur.docxIntro to the insurance data The insurance-csv data base contains insur.docx
Intro to the insurance data The insurance-csv data base contains insur.docx
 
ISFP I 27-- S 4-- F 45- -P5- compare THIS 4-letter personality type wi.docx
ISFP I 27-- S 4-- F 45- -P5- compare THIS 4-letter personality type wi.docxISFP I 27-- S 4-- F 45- -P5- compare THIS 4-letter personality type wi.docx
ISFP I 27-- S 4-- F 45- -P5- compare THIS 4-letter personality type wi.docx
 
Introduction- Splunk is a leading software platform for collecting- in.docx
Introduction- Splunk is a leading software platform for collecting- in.docxIntroduction- Splunk is a leading software platform for collecting- in.docx
Introduction- Splunk is a leading software platform for collecting- in.docx
 
IQ is normally distributed with a mean of 100 and a standard deviation.docx
IQ is normally distributed with a mean of 100 and a standard deviation.docxIQ is normally distributed with a mean of 100 and a standard deviation.docx
IQ is normally distributed with a mean of 100 and a standard deviation.docx
 
Is there any compiler error in the below Java program- class Point -{.docx
Is there any compiler error in the below Java program- class Point -{.docxIs there any compiler error in the below Java program- class Point -{.docx
Is there any compiler error in the below Java program- class Point -{.docx
 
Investment 1 has an expected return of 11-7- with a standard deviation.docx
Investment 1 has an expected return of 11-7- with a standard deviation.docxInvestment 1 has an expected return of 11-7- with a standard deviation.docx
Investment 1 has an expected return of 11-7- with a standard deviation.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

Jennifer would like to send an encrypted message to Robert- She wants.docx

  • 1. Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used to encrypt the message. Which of the following would be a suitable option for an encryption algorithm that meets her request? David has discovered a file containing encrypted passwords on the server. Which of the following is the most likely algorithm used to perform the encryption on the passwords? Jessica would like to implement cryptography. Which of the following protections does cryptography not provide? Lisa asks you for a recommendation of a way that she can confirm her identity to others and prove the integrity of the messages she sends. What would you recommend that Lisa requests? In a recent attack on your company network, an attacker used backwards compatibility of an SHA algorithm to force your server to use SHA-2 keys instead of SHA-3, and then used the vulnerability to gain access to the system. Which of the following was the attacker performing? Your company has decided to implement a new supply-chain system where all vendors will share a single ledger with the company, instead of duplicate ledgers where mistakes may be made. Which of the following is being implemented? Charles wants to perform software-based encryption on his files without downloading or purchasing an additional product. Which of the following is not an option for him? Margaret's laptop has a failed motherboard. When you remove her hard drive and place it in another computer, the hard drive fails to boot. You also receive a message about a missing TPM chip. Which of the following has been implemented on Margaret's hard drive? Your chief information security officer (CISO) is concerned about the security of IoT devices on your network. Which of the following is not a cryptography limitation of IoT devices? Anthony would like to verify that his downloaded file has not been damaged while in transit. Which of the following would you recommend that Anthony use to verify the file's integrity? a. SHA-3 b. RSA c. 3DES d. MD5