100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D385: Software Security and Testing 3 Questions and Answers Verified 100% Correct

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
23-03-2025
Written in
2024/2025

D385: Software Security and Testing 3 Questions and Answers Verified 100% Correct

Institution
D385
Course
D385









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D385
Course
D385

Document information

Uploaded on
March 23, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • d385

Content preview

D385: Software Security and Testing 3
Questions and Answers Verified 100% Correct


What is a side channel attack? - ✔✔Derives unauthorized information by measuring
any physical side channel (such as time sound, power consumption, electromagnetic
radiation, radio waves, and heat)



Python has no native encryption API, so what might you use instead? - ✔✔cryptography
or pycryptodome packages



When using the high level "recipes layer" API of cryptography, what protocol/class will you
be interacting with? - ✔✔Fernet



How is a fernet token created? - ✔✔The Fernet.encrypt method encrypts the plaintext
and then also hashes the ciphertext with HMAC-SHA256.



What class is used in combination with Fernet to implement key rotation? -
✔✔MultiFernet class



How does key rotation work? - ✔✔All ciphertext created with the old key must
be decrypted, then re-encrypted with the new key. Then the old key can be retired.



What is symmetric encryption? - ✔✔When an encryption algorithm both encrypts
and decrypts with the same key. (ex: Fernet)

, What are block ciphers? - ✔✔Symmetric encryption algorithms that encrypt plaintext as a
series of fixed-length blocks. Each block of plaintext is encrypted to a block of cyphertext. Block
size depends on the algorithm.



What is the current most popular symmetric encryption algorithm? -
✔✔Advanced Encryption Standard (AES)



What are stream ciphers? - ✔✔Symmetric encryption algorithms that encrypt plaintext as
a stream of individual bytes; one byte in, one byte out. Good at encrypting continuous or
unknown amounts of data. Often used by networking protocols.



What is the most common stream cipher? - ✔✔ChaCha. Its secure and very fast.



What is the difference between the two encryption algorithm modes: Electronic Codebook
Mode (ECB) and Cipher Block Chaining Mode (CBC) - ✔✔ECB encrypts identical plaintext
blocks to identical ciphertext blocks, making it prone to pattern recognition. CBC ensures that
each change to a block affects the ciphertext of all subsequent blocks, so it does not produce
any patterns. CBC is the mode to choose.



What is asymmetric encryption? - ✔✔An encryption method in which two keys (one
private, one public) are used to encrypt and decrypt a message.



What can ensure nonrepudiation? - ✔✔Digital signatures



How do digital signatures work? - ✔✔By combining a hash function with public-
key encryption



How do elliptic-curve digital signatures differ from RSA digital signatures? - ✔✔Elliptic-
curve digital signatures do not asymmetrically encrypt data, but they are much faster at
signing data and verifying signatures.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
340
Member since
2 year
Number of followers
104
Documents
38345
Last sold
1 day ago

3.4

57 reviews

5
25
4
8
3
7
2
1
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions