Explain how cryptography is useful in each of the following.
a. protecting a system’s master list of passwords
b. protecting stored files
c. protecting vulnerable transmissions in computer networks
a. protecting a system’s master list of passwords
b. Most systems store files in plaintext form. Encryption would make the information
useless to someone who gained access illicitly to the files.
c. Most networks are vulnerable to an eavesdropper’s intercepting messages being
sent across the network. If the messages sent are encrypted, an eavesdropper
would not be able to understand them.
You might also like to view...
What are the key issues to be obtained from conducting a site survey for each of the following?
a. Indoor b. Outdoor
Which of the following is an example of an inherence authentication?
A. Smart card B. Fingerprint scan C. One-time passcode D. Cognitive password
A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach?
A. Create VLANs to segment the network traffic B. Place a network sniffer on segments with new employees C. Provide end user awareness and training for employees D. Ensure best practices were implemented when creating new user accounts
A customer's computer is using FAT32. Which file system can you upgrade it to when using the convert command?
A. NTFS B. HPFS C. exFAT D. NFS