In a type of on-path attack also called a "downgrade attack," stripping this forces an unwanted HTTP connection.
What is SSL?
This hashing algorithm was developed by the NSA & is widely used for data integrity.
What is SHA?
Given DES, IDEA, SHA-256, & DSA to encrypt ACRO.txt, Bob cannot use one.
What is RIPEMD?
What is MD5?
Alice, who wants to be as secure as possible, is given a choice between PAP & CHAP, so she must choose this one.
What is CHAP?
This is the weakest form of WiFi encryption & is no longer considered secure.
What is WEP?
This cryptographic authentication technique uses a hash function & a symmetric key.
What is HMAC?
Given SHA-512, GPG, NTLM, & MD5, Alice will choose this one to encrypt ACRO.txt.
What is GPG?
Given OTP, 2FISH, NTLM, & SHA-2, Alice must choose the strongest hashing algorithm.
What is SHA-2?
Bob will use this most secure authentication protocol option since his wireless connection uses WPA3.
What is EAP?
This security measure automatically encrypts all hard drive data.
What is FDE?
This open standard is a one-time password system that uses hash-based message authentication codes.
What is HOTP?
Alice & Bob are arguing about which is the latest Rivest Cipher, & you settle by saying this.
What is RC6?
This replaced LM Hash for Windows, although it is currently disabled by default on most modern machines.
What is NTLM?
This protocol that encapsulates EAP in a TLS tunnel was jointly developed by Cisco, Microsoft, & RSA Security.
What is PEAP?
This encrypts data as it is written to the drive.
What is an SED?
This Boolean logic operation that is widely used in cryptography may be used to combine hashes.
What is XOR?
Given IDEA, RC5, AES, & DSA, Alice will choose this since she is required to use asymmetric encryption.
What is DSA?
This algorithm was created to replace MD5 & creates a fixed-length 160-bit hash value.
What is SHA-1?
This open protocol was developed by Cisco handles AAA services.
What is TACACS+?
This chip is an important Windows hardware-based solution that is an integral part of BitLocker drive encryption.
What is TPM?
This networking protocol uses shared secret keys & one-way hashing to enable authentication for DNS database updates.
What is TSIG?
Given GPG, ECC, 3DES, & RSA, Bob cannot choose this one since he has been told whether or not he can use symmetric encryption.
What is RSA?
This was created as a competitor to the SHA family, but has not gained the same level of popularity.
What is RIPEMD?
Given LDAP, TACACS+, & RADIUS, Alice must choose the 802.1X solution.
What is RADIUS?