Section 15.3 Cryptography Implementations Practice Questions
Alan wants to implement a security tool that protects the entire contents of a hard drive and prevents access even if the drive is moved to another system. Which of the following tools should he choose? - BitLocker - EFS - IPsec - VPN
BitLocker
Which of the following encryption tools would prevent a user from reading a file that they did not create and does not require you to encrypt an entire drive? - EFS - IPsec - VPN - SSL
EFS
Which of the following is an open-source cryptography toolkit that implements SSL and TLS network protocols and the related cryptography standards required by them? - Symantec Drive Encryption - OpenSSL - BitLocker - EFS
OpenSSL
Which of the following uses on-the-fly encryption, meaning the data is automatically encrypted immediately before it is saved and decrypted immediately after it is loaded? - Transport Layer Security (TSL) - BitLocker - Secure Sockets Layer (SSL) - VeraCrypt
VeraCrypt
Donna is configuring the encryption settings on her email server. She is given a choice of encryption protocols and has been instructed to use the protocol that has the most improvements. Which of the following cryptographic protocols should she choose? - SSL - VeraCrypt - OpenSSL - TLS
TLS