Questions
Answer the following questions to test your knowledge of this chapter:
- Recent log analysis has revealed that archived documents have been tampered with, even though the hash-matching database shows that the values have not changed. What could have caused this?
- A weak symmetric cipher
- Hash collision
- An asymmetric algorithm with a small key size
- A poor choice of block cipher
- Recent log analysis has revealed that archived documents have been tampered with. To mitigate this vulnerability, which of the following should not be used?
- RACE-320
- MD5
- SHA-384
- SHA3-256
- Developers are creating a File Integrity Monitoring (FIM) solution to market to government agencies. What would be a good choice, considering FIPS compliance?
- RACE-256
- MD5
- SHA-512
- ECC
- Google engineers are configuring security for a new regional data center. They are looking to implement SSL/TLS for customer-facing application servers. What would be a good choice, considering the need for speed and security?
- ChaCha256...