O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exercises

In the following exercises, you apply what you’ve learned in this chapter. The answers for these exercises are located in the Answers section at the end of this chapter.

Exercise 3-1

Download a cryptography utility from a trusted source. An example might be TrueCrypt from http://www.truecrypt.org. Install the application and establish an encrypted volume. Notice the cryptographic functions required to build and mount the encrypted volume, including the encryption algorithm, password creation, and key creation.

Identify the cryptographic ciphers and the hashing algorithms implemented by the application and the type of cipher.

Exercise 3-2

Locate the Trusted Root Certification Authorities list on your computer. In Internet Explorer, this can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required