Which of the following security solutions would prevent a user from reading a file that they did not create?
Counter Mode (CTR)
A block cipher mode of operations that uses nonce combined with a counter that is encrypted.
TPM (Trusted Platform Module)
A hardware chip on the motherboard included with many |aptops and some mobile devices. It provides full disk encryption.
Which algorithms are used in asymmetric encryption?
RSA and Diffie-Hellman
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called
Salting
Which of the following terms means a cryptography mechanism that hides secret communications within various forms of data?
Steganography
Rainbow Table Attack
The attacker uses a list of hashed data to match the cleartext version.
EFS
Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
What is the main function of a TPM hardware chip?
Generate and store cryptographic keys
HSM (Hardware Security Module)
a dedicated cryptographic processor often used in high-security environments like financial institutions, and it can be removed and replaced as needed.
BitLocker
a microsoft utility to encrypt a full drive
secure enclave
a separate, isolated environment within the device's processor where sensitive data can be securely stored and processed.
Transparent Data Encryption (TDE)
database encryption methods that encrypts the entire database and all backups
Which of the following is used to verify that a downloaded file has not been altered?
hash