Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT279 Unit 4 Assignment, Assignments of Computer Science

Questions and answers related to symmetric cryptography and risk management. The questions cover topics such as the strengths and weaknesses of symmetric cryptography, stream ciphers, and risk treatment options. references to relevant study materials for further reading.

Typology: Assignments

2023/2024

Available from 10/17/2023

Testfix
Testfix 🇬🇧

4.5

(13)

282 documents

Partial preview of the text

Download IT279 Unit 4 Assignment and more Assignments Computer Science in PDF only on Docsity! IT 279 UNIT 4 ASSIGNMENT 1 Unit 4 Assignment Purdue University Global IT279 CISSP II 1. Which statement is true of symmetric cryptography? A. Symmetric cryptography is faster than asymmetric cryptography. B. Symmetric cryptography uses different keys to encrypt and decrypt messages. C. Symmetric cryptography does not require a secure mechanism to properly deliver keys. “The major strength of symmetric key cryptography is the great speed at which it can operate. Symmetric key encryption is very fast, often 1,000 to 10,000 times faster than asymmetric algorithms” (Chapple, Stewart, & Gibson, 2018, p. 216). 2. You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use? A. RC4 B. RC5 C. RC6 “The Rivest Ciphers are a series of symmetric algorithms that include RC2, RC4, RC5, and RC6. RC4: A stream cipher (data is encrypted in real time) that uses a variable-length key (128 bits is standard)” (Miller & Gregory, 2016, p. 189). 3. Your organization is working with an international partner on a new and innovative product. All communication regarding this must be encrypted using a public domain symmetric algorithm. Which algorithm should you use? A. DES B. Blowfish C. 3DES IT 279 UNIT 4 ASSIGNMENT 2 “However, time trails have established Blowfish as a much faster algorithm than both IDEA and DES. Also, Mr. Schneier released Blowfish for public use with no license required. Blowfish encryption is built into a number of commercial software products and operating systems. A number of Blowfish libraries are also available for software developers” (Chapple, Stewart, & Gibson, 2018, p. 223). 4. You are the security administrator for an organization. Management decides that all communication on the network should be encrypted using the data encryption standard (DES) algorithm. Which statement is true of this algorithm? A. The effective key size of DES is 64 bits. B. A Triple DES (3DES) algorithm uses 48 rounds of computation. C. A DES algorithm uses 32 rounds of computation. IT 279 UNIT 4 ASSIGNMENT 5 C. Which of the following processes of risk management is the process of selecting strategies to deal with identified risk, according to business risk appetite? A. Risk assessment B. Establish scope and boundaries C. Risk treatment “Risk analysis identifies risks, quantifies the impact of threats, and aids in budgeting for security. It helps integrate the needs and objectives of the security policy with the organization’s business goals and intentions” (Stewart, Chapple, & Gibson, 2018, p. 83). D. Which of the following risk treatment options defines that a risk may be accepted? A. Mitigate the risk B. Transfer the risk C. Tolerate the risk “Accepting risk, risk tolerance, or acceptance of risk is the result after a cost/benefit analysis shows countermeasure costs would outweigh the possible costs of loss due to a risk” (Stewart, Chapple, & Gibson, 2018, p. 76). IT 279 UNIT 4 ASSIGNMENT 6 References Chapple, M., Stewart, J. M., Gibson, D. CISSP: Certified Information Systems Security Professional Official Study Guide. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119475873/ Miller, L. C., Gregory, P. H. CISSP For Dummies. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119210252/ IT 279 UNIT 4 REPORT CARD Total number of Quiz taken : Total number of Questions taken : Total number of Answers provided : Total Unique Question Taken : Please select a certification then click on the OK button : Select Certificate 1215 1200 717
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved