• Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Part1 Security question

 
David Dong
Ranch Hand
Posts: 58
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Is the following scenario using asymetric or symetric key?

How would you analyze this scenario.

Here is the question:
You are working on a new application that will help your company
co-ordinate sales data across different departments.
The aim is that everyone has the same sales data at the same time.
This project needs to be finished as soon as possible.
You have therefore bought some third party code to speed up the development process.
The code has been signed and is packaged in a jar file.
To test the signature the vendor of the software has emailed you the public key.
What do you know about it?
 
Raghubir Bose
Ranch Hand
Posts: 88
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I am sorry but this type of question will not be asked in the real exam.I mean not symmetric and assymetric keys.But the scenario told below.I have seen this scenario during my preperation of part1.Typically in whizlabs or other mock tests you will have it.The perspective is more social here than technical.
Please refer to Mark Cade and Simon Robert's comments on this aspect of security in their book.
 
David Dong
Ranch Hand
Posts: 58
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
You are right. It would not be in the exam.

Thanks for the suggestion.
I have read Mark cade and simmon roberts book.
It help me gained the understanding I need.


thanks,
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic