subject

(Hacker Techniques, Tools & Incident Handling, Third Edition) - Assessment Worksheet Applying Encryption and Hashing Algorithms for Secure Communications
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:
Lab Assessment Questions & Answers
1. Compare the hash values calculated for Example. txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
2. If you were to create a new MD5sum or SHA1sum hash value for the modified Example. txt file, would the value be the same or different from the hash value created in Part 3 of the lab?
3. If you want secure email communications without encrypting an email message, what other security countermeasure can you deploy to ensure message integrity?
4. When running the GnuPG command, what does the -e switch do? a. Extract b. Encrypt c. Export
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
6. Name the cryptographic algorithms used in this lab.
7. What do you need if you want to decrypt encrypted messages and files from a trusted sender?
8. When running the GnuPG command, what does the -d switch do? a. Detach b. Destroy c. Decrypt
9. When creating a GnuPG encryption key, what are ways to create entropy?

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:30
Select all that apply. which of the following are proofreading options included in microsoft word? spell check find replace grammar check formatting check
Answers: 1
question
Computers and Technology, 23.06.2019 03:10
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e.g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
question
Computers and Technology, 23.06.2019 07:00
Why is investing in a mutual fund less risky than investing in a particular company's stock? a. mutual funds only invest in blue-chip stocks. b. investments in mutual funds are more liquid. c. mutual funds hold a diversified portfolio of stocks. d. investments in mutual funds offer a higher rate of return.
Answers: 2
question
Computers and Technology, 23.06.2019 20:00
Match the file formats with the types of multimedia they can store
Answers: 2
You know the right answer?
(Hacker Techniques, Tools & Incident Handling, Third Edition) - Assessment Worksheet Applying E...
Questions
question
Mathematics, 13.10.2020 05:01
Questions on the website: 13722367