AND ANSWERS
Alice is using volume encryption on her laptop. Which of the following attacks are
blocked by volume encryption, instead of other techniques, like file encryption or access
controls? Select all that apply. - Answer- Someone steals Alice's laptop.
Alice forgets to explicitly encrypt a sensitive file.
Access control protects data on a computer against: - Answer- hostile users.
Which of the following are practical risks that apply to software-based volume
encryption systems? Select all that apply. - Answer- Intercept a passphrase that unlocks
the encrypted drive
Online eavesdropping on a software encryption process
Volume encryption protects data on a computer against: - Answer- theft.
When encrypting data with a block cipher, each repetition is called a: - Answer- round.
True or False? After changing an encryption key, all backup copies of the protected file
are also protected by the new key. - Answer- False
Encryption can help protect volumes in all of the following situations, except: - Answer-
to prevent physical damage to a hard drive.
We have implemented volume encryption using a self-encrypting drive. Which of the
following attacks is the volume still vulnerable to? Select all that apply. - Answer- Trojan
BIOS intercepting the unlock code when the operator unlocks the drive
What role does the trusted third party serve in public-key certificates? Select all that
apply. - Answer- Signs public-key certificates using its private key
Publishes its own public key so others can use it to verify the certificates it issues
True or False? A bit-flipping attack is not knowing what the message says and changing
it bit by bit. - Answer- False
True or False? There is a single, global public-key infrastructure (PKI). - Answer- False