100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D334 ITAS 2141 (Intro to Cryptography) Latest Final Assessment Review 2026

Rating
-
Sold
-
Pages
19
Uploaded on
19-01-2026
Written in
2025/2026

D334 ITAS 2141 (Intro to Cryptography) Latest Final Assessment Review 2026 D334 ITAS 2141 (Intro to Cryptography) Latest Final Assessment Review 2026 D334 ITAS 2141 (Intro to Cryptography) Latest Final Assessment Review 2026 D334 ITAS 2141 (Intro to Cryptography) Latest Final Assessment Review 2026

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 19, 2026
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

D334 ITAS 2141

Introduction to Cryptography


Latest Final Assessment Review


(With Solutions)



2026




1

,1. Multiple Choice
In AWS KMS, which of the following key types is primarily used to encrypt
data encryption keys for envelope encryption?
A) Asymmetric key
B) Symmetric key
C) Hash key
D) Session key

Answer: B) Symmetric key
Rationale: AWS KMS primarily uses symmetric keys for encrypting data
keys in envelope encryption because symmetric cryptography is fast and
efficient for key wrapping.

2. True/False
AWS CloudHSM uses FIPS 140-2 Level 3 validated hardware security
modules to provide external key storage separate from AWS KMS.
Answer: True
Rationale: CloudHSM provides dedicated HSM appliances meeting FIPS
140-2 Level 3, unlike AWS KMS, which is a managed service.

3. Fill in the Blank
In asymmetric cryptography, the key used to encrypt data is the
__________ key, while the key used to decrypt is the __________ key.
Answer: public, private
Rationale: In public-key cryptography, the public key encrypts, and only
the private key can decrypt.

4. Short Answer
Explain why AWS recommends using envelope encryption for securing
large data objects in S3 rather than direct KMS encryption.
Answer: Because KMS has request rate limits and encrypting large blobs
directly with KMS would be inefficient and costly. Envelope encryption
uses KMS to encrypt a small data key, which is then used to encrypt large
2

, data objects locally or in S3.
Rationale: Envelope encryption balances performance and security.

5. Matching
Match the following AWS services with their primary cryptographic
functions:
a) AWS KMS
b) AWS CloudHSM
c) AWS Secrets Manager
d) AWS Certificate Manager

SSL/TLS certificate management
Hardware-based key storage
Key management and cryptographic operations
Secure storage and rotation of passwords and secrets
Answer: a-3, b-2, c-4, d-1
Rationale: Each service has a distinct cryptographic role in AWS security.

6. Multiple Choice
Which cryptographic hash function is considered more secure and is
recommended for digital signatures in AWS environments?
A) MD5
B) SHA-1
C) SHA-256
D) LM hash

Answer: C) SHA-256
Rationale: SHA-256 is part of the SHA-2 family and is currently considered
secure, while MD5 and SHA-1 are vulnerable.

7. True/False
Digital signatures provide both data integrity and non-repudiation but
not confidentiality.
Answer: True
3

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bankart Chamberlain College of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
150
Member since
2 year
Number of followers
31
Documents
4512
Last sold
6 days ago

3.6

21 reviews

5
9
4
0
3
9
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions