1.Which of the following statements about asymmetric-key encryption is correct?
a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties.
b Employees in the same company share the same public key.
c Most companies would like to manage the private keys for their employees.
d Most companies would like to use a Certificate Authority to manage the public keys of their employees.
e Two of the above are correct.
2 Which of the following controls would most likely assure that a company can reconstruct its financial records?
Security controls such as firewalls
Backup data are tested and stored safely
Personnel understand the data very well
Paper records
3.Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A message digest.
A 16-bit encryption key.
A public key and a private key.
A digital signature.
4.Which of the following is not one of the main components of vulnerability management and assessment?
Identification.
Remediation.
Internalization.
Maintenance.
5.A Public Key Infrastructure (PKI) provides the ability to do which of the following?
Encrypt messages using a private key.
Enable debit and credit card transactions.
Read plaintext.
Issue, maintain, and revoke digital certificates.
6.Which of the following statements is incorrect about digital signatures?
A digital signature can ensure data integrity.
A digital signature also authenticates the document creator.
A digital signature is an encrypted message digest.
A digital signature is a message digest encrypted using the document creator's public key.
Asymmetric keys are the foundation of Public Key Infrastructure (PKI) a cryptographic scheme requiring two different keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One key is published (public key) and the other is kept private (private key). If the lock/encryption key is the one published, the system enables private communication from the public to the unlocking key's owner. If the unlock/decryption key is the one published, then the system serves as a signature verifier of documents locked by the owner of the private key. This system also is called asymmetric key cryptography.
1.Which of the following statements about asymmetric-key encryption is correct?
a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties.
2 Which of the following controls would most likely assure that a company can reconstruct its financial records?
Backup data are tested and stored safely
1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...
Which of the following types of encryption uses a pair of keys known as a public and private? a. asymmetric b. message digest c. SHA1 hashing d. symmetric
1. In a scenario where Nancy and Matthew are using public key encryption, which keys will Matthew have the ability to see in his public keyring (--list-keys)? 2. If Nancy wishes to send a message to Matthew, which key does she use to encrypt the message? 3. If Matthew receives an encrypted message from Nancy, which key does he use to read it? 4. If Matthew wishes to send a message to Nancy, which key does he use to encrypt...
secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...
1. Create an RSA private key 2. Output the key in a text format so that it shows the following: modulus public exponent (e) private exponent (d) the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...
Question 4 (5 points) Consider the following scenario: Alice wants to send Bill a message. Alice encrypts some information using Bill's public key; Bill decrypts the ciphertext using his private key. This is an example of: Question 4 options: 1) symmetric encryption 2) digital certificate 3) asymmetric encryption 4) digital signature
Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...
The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...
Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...
1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________ 2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________ 3. If the sender of a message encrypts the...
Research the following: Symmetric key vs. Asymmetric key Public vs. Private Pre-shared key? Answer: Which one do you believe is more secure? and why. Are they equally secure? if not explain.