Please answer ALL the questions carefully. Thanks 9- a user reports several corr
ID: 3719258 • Letter: P
Question
Please answer ALL the questions carefully. Thanks
9- a user reports several corrupted imaged in the companyshare graphicsfolder Upon investigation, the security administrator discovers the corrupted images do not match their original hash value. The MOST likely cause of this that someone. A) has encrypted all of the images in the folder B) has hidden data within image files C) has added a digital signature to the images D) has inserted a block cipher into the images 10- An organization is conducting tests as a part of an exercise related to the use of one-time pads as a secure means of encryption. Which of the following should require as part of the exercise? A) Key stretching B) Out-of-band key exchange C) Ephemeral Key D) Key escrow 11- Given the following firewall log entires:Explanation / Answer
Q9) A user reports several corrupted images in the path. Upon investigation, the security administrator discovers the corrupted images do no match their original hash value. The most likely cause of this is that someone
Answer)
B) has hidden data within image files.
This is because, the mapping is done in the use of a image using hashing. When the hash value of an image changes, there is guarantee that the data within the image has changes abruptly and thus has become corrupted. In the above options in the question, if somebody has hidden any data within the image files, then only the hash value can change.
Q10) An organization is conducting tests as a part of an exercise related to the use of one-time pads as a secure means of encryption. Which of the following should require as part of the exercise?
Answer)
B) Out-of-band key exchange
C) Ephemeral Key
I don't know how many answers are there for the above questions but for the above question both B and C are correct.
Out-of-band key exchange is required when you're using one-time pads as a secure means of encryption over the Internet. This is because, there has got to be another medium of any choice which will transfer the secure key over to the user to decrypt the message encrypted using one-time pad.
Ephemeral Key is a secret key which are very short in life span and have to be created afresh for each new session or use in encryption. Thus, Ephemeral keys can be used in one-time pads as a secure means of encryption.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.