Users on your organization's network need to be able to access several confidential files located on a file server. Currently, the files are encrypted. Recently, it was discovered that attackers were able to change the contents of the file. You need to use a hash function to calculate the hash values of the correct files. Which of the following should you not use?

Users on your organization's network need to be able to access several confidential files located on a file server. Currently, the files are encrypted....

Management at your organization has decided that it no longer wants to implement asymmetric algorithms because they are much more expensive to implement. You have determined that several algorithms are being used across the enterprise. Which of the following should you discontinue using, based on management's request?

Management at your organization has decided that it no longer wants to implement asymmetric algorithms because they are much more expensive to implement....

You have recently been hired by a company to analyze its security mechanisms to determine any weaknesses in their current security mechanisms. During this analysis, you detect that an application is using a 3DES implementation that encrypts each block of data three times, each time with a different key. Which 3DES implementation does the application use?

You have recently been hired by a company to analyze its security mechanisms to determine any weaknesses in their current security mechanisms. During...

Your organization recently obtained a contract with the U.S. Department of Defense (DoD). As part of this contract, your organization will be exchanging confidential data with the DoD. Management has requested that you implement the most secure encryption scheme available for these data exchanges. Which scheme should you implement?

Your organization recently obtained a contract with the U.S. Department of Defense (DoD). As part of this contract, your organization will be exchanging...

Your organization's enterprise implements several different encryption algorithms, based on the organizational needs and the data being protected. Recently, several different encryption keys have generated the same ciphertext from the same plaintext message. This has resulted in your organization's enterprise being susceptible to attackers. Which condition has occurred?

Your organization's enterprise implements several different encryption algorithms, based on the organizational needs and the data being protected. Recently,...

Encryption at different layers of OSI model.

•layer 7- encrypt email with PGP •layer 5- encrypt session data with SSL or TLS •layer 3- encrypt network layer data with IPSec •layer 2- encrypt data...

DES uses two standardized block cipher modes.

ECB: [electronic codebook] mode- serially encrypts each 64-bit plaintext block using same 56-bit key. If two identical plaintext blocks are encrypted...

PGP process

The content of emails is encrypted twice, once with the sender's private key, and again with the receiver's public key. The receiver must reverse the...

Diffie-Hellman [DH] Key Agreement

Lets 2 parties share information over an untrusted network and mutually compute an identical shared secret that cannot be computed by eavesdroppers who...

SSHv1 connection process.

SSHv1 connection process Answer: • Client connects to server and server presents client with its public key. • Client and server agree to a mutually...

How to ensure the identity of the entity?

How to ensure the identity of the entity? Answer: A system must challenge the peer to prove that it has the private key that is associated with...

A manager is suspected of leaking trade secrets to a competitor. A security investigator is examining his laptop and notices a large volume of vacation pictures on the hard drive. Data on this laptop automatically uploads to a private cloud owned by the company once a week. The investigator noticed that the hashes of most of the pictures on the hard drive are different from the hashes of the pictures in the cloud location. Which of the following is the MOST likely explanation for this scenario?

A manager is suspected of leaking trade secrets to a competitor. A security investigator is examining his laptop and notices a large volume of vacation...