Strayer CIS 552 CIS552 Week 2 Lab Assessment Worksheet Solution
CIS552 Week 2 Lab Assessment Worksheet (STRAYER)
1 Compare the hash values that were calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
2 Why are the MD5sum and SHA1sum hash values the same every time you calculate for the example.txtfile? What would be the significance if they were different when you re-calculated the hash value at the other end?
3 If you want secure email communications without encrypting an email message, what other security countermeasure could be deployed to ensure message integrity?
4 What is the -e switch used for with running the GnuPG command?
5 What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
6 Name the cryptographic algorithms used in this lab.
7 What is needed if you want to decrypt encrypted messages and files from a trusted sender?
8 What is the -d switch used for when running the GnuPG command?
We Also Recommend
"Applying Skills Learned" Please respond to the following- From the e-Activity, explain what you learned about the Website you selected
(TCO 3) Managers are often required to make decisions about the future based