Interaction.5
First of all, which cryptographic technique can be used to verify the identity of a message's sender?
☐ Shared Secret Key.
☑ Public-Private Key.
☐ Hashing.
First of all, which cryptographic technique can be used to verify the identity of a message's sender?
☑ Shared Secret Key.
☐ Public-Private Key.
☐ Hashing.
OK, and how would you use public-private key cryptography to identify the sender of a message?
There are two different asymmetrical keys that are used to identify the sender. The way this works is that is it part of a mathematical equation and if it is correct the receiver will know what the message came from the sender. So when using PPK you can send a message will be send and only the receiver can read it.
The board seems to think that requiring usernames and passwords is enough security for our users. Do you agree?
☑ No; we also need other levels of authentication such as machine authentication in order to provide adequate security.
☐ No; we should require a series of security questions at each login attempt to validate the users.
☐ Yes; as long as the users keep them secure, this is adequate security.
Is two-factor authentication adequate for a bank? Why or why not?
It makes sure that no can steal some information and get to your account. They would need to get that physical piece, a card or id to prove they are the correct person. If your pin or password was stolen, you can be sure that your money is safe since they need that physical object. I feel that is adequate and is a great idea. That is one reason it is good to put see id on your credit cards as well so they need a two-factor authentication.
Which networking device is primarily concerned with getting traffic to its ultimate destination?
☐ Bastion Hosts
☑ Routers
☐ Bastion hosts and routers both do this.
And how does security differ between routers and bastion hosts?
A