Encryption Quiz

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

1. Amala wants the app to be secure.

She considers methods of encrypting the data


sent to IoT devices. Give two encryption types that Amala should consider.
Symmetric encryption and Asymmetric encryption.

2. A car manufacturer has factories in several different countries. The head office is
in London. The factory in Colombo sends sensitive data to the head office using
asymmetric (public key) encryption. Describe the process of asymmetric encryption
for data sent from Colombo to London.
The factory of Colombo will be the sender and create a public key in order to encrypt
the plaintext and turn it into ciphertext. Then, over a large network, the factory in
Colombo and the factory in London will need to exchange a private key so that
London is able to decrypt the information.

3. Many of the websites hosted by the company belong to individuals. The websites
are hosted in the cloud. Two advantages of using cloud storage is that the website
owners have more secure and flexible storage of their data. Explain how secure
and/or flexible storage is achieved in this context.
One advantage of cloud storage is that it is always available with internet and it is
controlled by data centers all around the world. If in any case there are malfunctions
with the company's servers or hardware, the data is already safely stored in the cloud
and the company is able to access it. Even if one data center is down, the servers are
moved to another center and the cloud continues to run.

Another advantage is that the company is able to store however much they need in
their cloud even if a payment needs to be made, cloud is cost-efficient meaning it will
not be very expensive to pay for extra storage. Since the company may need to store
specific files in certain places, cloud provides the ability to store what is needed in
any files that the company wishes to create.

4. Companies use backup systems to protect business-critical data. When planning


a backup system, a number of factors need to be considered. One factor is the
amount of storage space that will be needed. State six other factors that should be
considered when planning a backup system.
1) Archive system
2) How many times backups are needed for the business
3) What is needed for a backup - tools, methods
4) A recovery process
5)
6)

You might also like