Strayer CIS 552 CIS552 Week 2 Lab Assessment Worksheet Solution

Strayer CIS 552 CIS552 Week 2 Lab Assessment Worksheet Solution

soffix

  • $12.99


CIS552 Week 2 Lab Assessment Worksheet (STRAYER)

1 Compare the hash values that were calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.

2 Why are the MD5sum and SHA1sum hash values the same every time you calculate for the example.txtfile? What would be the significance if they were different when you re-calculated the hash value at the other end?

3 If you want secure email communications without encrypting an email message, what other security countermeasure could be deployed to ensure message integrity? 

4 What is the -e switch used for with running the GnuPG command?

5 What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?

6 Name the cryptographic algorithms used in this lab.

7 What is needed if you want to decrypt encrypted messages and files from a trusted sender?

8 What is the -d switch used for when running the GnuPG command?


                We Also Recommend


                Sale

                Unavailable

                Sold Out