Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Cloud+ Certification Chapters 3 and 4 Labs

[WLOs: 1, 2, 3, 4] [CLO: 5]
Prior to beginning work on this assignment, review Chapters 3 and 4 from the CompTIA
Cloud+ Certification: CVO-002 course textbook. Additionally, read the instructions
provided on the IMPORTANT: Read First page to complete this assignment. This
assignment is split into two parts.
Part 1
In Microsoft Azure, complete the following labs for Chapters 3 and 4:

 Chapter 3 – Exercise: Enabling Multifactor Authentication


 Chapter 3 – Exercise: Creating a User with Read-Only Rights
 Chapter 4 – Exercise: Enabling Storage Container Encryption
 Chapter 4 – Exercise: Enabling VM Disk Encryption

For each step of each lab, use a screen capture tool of your choice. Please view Use
Snipping Tool to Capture Screenshots Links to an external site., How to Take a
Screenshot on your Mac Links to an external site., or 9 Ways to Take a Screenshot on a
Windows PC, Laptop, or Tablet, Using Built-In Tools Links to an external site.for
assistance. Document the progress and completion of the labs in a Word document. All
screenshots should be placed into one Word document with the steps labeled. Be sure
to use headers to identify each lab for this assignment.
Once you have completed the labs, save your Word document as a PDF and upload to
Waypoint below.
1-2 Scenario Assignment Module One: Cryptography
 

Review the following questions from Network security: Private communication in a public


answering each prompt, be sure to defend your answers and explain how you have arrived

1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from
each message a hash of that message. Why does this not solve the problem? What does s

Hint: We know of a protocol that uses this technique in an attempt to gain securit

2. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each oth
impersonate Carol to Alice (actually any of the three could impersonate the other to the t
uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her ide
key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol's answer to Alice's c

3. Assume a cryptographic algorithm in which the performance for the good guys (the ones
which the only way to break it is a brute-force attack of trying all possible keys. Then, supp
encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size k
computers twice as fast. Given that both parties--- the good guys and the bad guys--- get
to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communicati
PTR. (note: this textbook is a reference for the assignment and not a required resource fo

In each of your responses to the above scenarios, please ensure that you provide a brief exp

For additional details, please refer to the Scenario Assignment Module One Guidelines and

You might also like