CIS410_Protecting_Data_With_Encryption

CIS410_Protecting_Data_With_Encryption - Eric Walker Mr....

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Eric Walker Mr. Trevethan CIS410 August 4, 2011 LAB QUESTION 1 - What types of TrueCrypt volumes can be created? Standard TrueCrypt volume and Hidden TrueCrypt volume are the two types of TrueCrypt volumes that can be created. LAB QUESTION 2 - What is a hidden volume? A hidden volume is like hidden file. It’s a volume on a computer system that is not visible to anyone unless the show hidden files and folders option is selected in the folder options menu. LAB QUESTION 3 - What Encryption Algorithms can be selected? The different encryption algorithms available are: AES, Serpent, Twofish, AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent- Twofish-AES, and Twofish-Serpent. Are any preferable? AES is the preferred method. LAB QUESTION 4 - What Hash Algorithms can be selected? The different hash algorithms available are: RIPEMD-160, SHA-512, and Whirlpool. Write password here: Password1@ LAB QUESTION 5 – For the mounted volume K, what are the following properties: Encryption Algorithms, Key
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/09/2011 for the course CIS CIS410 taught by Professor Mr.t during the Spring '11 term at ECPI College of Technology.

Page1 / 2

CIS410_Protecting_Data_With_Encryption - Eric Walker Mr....

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online