Jennifer would like to send an encrypted message to Robert. Shewants to send him a different key from the one she used to encryptthe message. Which of the following would be a suitable option foran encryption algorithm that meets her request?
David has discovered a file containing encrypted passwords onthe server. Which of the following is the most likely algorithmused to perform the encryption on the passwords?
Jessica would like to implement cryptography. Which of thefollowing protections doescryptography not provide?
Lisa asks you for a recommendation of a way that she can confirmher identity to others and prove the integrity of the messages shesends. What would you recommend that Lisa requests?
In a recent attack on your company network, an attacker usedbackwards compatibility of an SHA algorithm to force your server touse SHA-2 keys instead of SHA-3, and then used the vulnerability togain access to the system. Which of the following was the attackerperforming?
Jennifer would like to send an encrypted message to Robert. She wants to send him a different key from the one she used
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am