Reference no: EM133244486
Assignment:
1. Which is true about the Electronic Codebook (ECB) algorithm?
A. It uses a weak key
B. Each block of data is encrypted with the same key
C. Each block of data is encrypted with a random key
D. It uses an initialization vector when encrypting each block of data
2. Which is the best method to reduce bandwidth when checking if a certificate is revoked?
A. Use a CSR
B. Self-sign the certificate
C. Implement OCSP with stapling
D. Use a CRL
3. Which of the following actually performs the encryption of data?
A. Crypto modules
B. CA
C. Digital certificate
D. CRL
4. What does a customer need to provide the RA so they can issue a digital certificate?
A. CSR
B. CRL
C. Digital signature
D. Domain validation
5. Which provides the highest level of assurance that verifies the legal entities of the certificate owners?
A. Wildcard digital certificate
B. Extended validation (EV) certificate
C. Subject alternative name
D. Domain validation certificate
6. What is the highest level of trust in PKI?
A. RA
B. Digital certificate
C. Root CA
D. Intermediate CA
7. Which method allows a third party to store a copy of a private key?
A. Key archiving
B. Key escrow
C. Offline CA
D. Distributed-trust model
8. Where is a revoked digital certificate listed?
A. Shadow file
B. NSA
C. CRL
D. PKI
9. What security protocol should be used for providing confidentiality of voice data?
A. WPA2 with CCMP
B. SSH
C. IPSec
D. SRTP
10. Which is true about a distributed-trust model?
A. Only root CAs can validate signatures
B. Both root CAs and intermediate CAs can validate signatures
C. It is not recommended for large-scale models of signature validation
D. There are no root CAs
Develop a process for validating forensic data
: Data that has been acquired must then be analyzed. During the analysis process, the data must also be validated. Develop a process for validating forensic Data.
|
Rainn case study
: When you think of Non profit agencies you think of grant funding, donation base, and volunteers helping to support and drive the mission. With that, the help on
|
Deviance is a violation of established cultural
: Deviance is a violation of established cultural, or social norms, whether folkways, mores, or codified law. Consider these historical events during the U.S. civ
|
Assimilation of native american children
: What purpose did this forced assimilation serve and whom did it benefit? What might today resemble if Native Americans had not been forced to assimilate?
|
Which is true about the electronic codebook algorithm
: Which is true about the Electronic Codebook (ECB) algorithm? Which is the best method to reduce bandwidth when checking if a certificate is revoked?
|
List the newborn sensation and motor skills
: 1. List the newborn's sensation and motor skills. 2. Describe how sensation, perception, and cognition differ, and give the major changes in each during the fi
|
Possibility of discrimination in the workplace
: What should society do to reduce the possibility of discrimination in the workplace? What policies would you propose if you were the CEO?
|
How does using sociological imagination help sociologists
: How does using sociological imagination help sociologists in their research? List one personal value and explain why it is important to you.
|
Understanding of the black maternal mortality rate disparity
: Discuss how social work theories lends an understanding of the Black Maternal Mortality rate disparity. For example, Psychoanalytic theory can assist us in unde
|