To solve this question, let us deploy
IMS's four-step technique.
STEP #1 ->
IDENTIFY THE QUESTION TYPELet us read the question stem to identify the question type.
Quote:
Which of the following, if true, most weakens the conclusion of the government experts referred to above?
The stem indicates a
weakening question.
STEP #2 ->
X-RAY THE ARGUMENTIn a
weakening question, it is a must to x-ray the argument and deconstruct it. Since we are to weaken the conclusion of the government experts, let us note the experts' conclusion along with the premise(s) once the argument is read.
Quote:
Years ago, some in the government's intelligence community feared the work of telecommunications researchers at then-emerging private security firms. The government experts concluded that these private firms posed the biggest risk to successful government espionage. As the private security firms began publicly releasing and advertising encryption algorithms and other security products, these government experts saw support for their conclusion when an encryption algorithm that government experts could not break began appearing in countless emails.
CONCLUSION: The private security firms posed the biggest risk to successful government espionage.
PREMISE: An encryption algorithm that government experts could not break began appearing in countless emails as the private security firms began publicly releasing and advertising encryption algorithms and other security products.
STEP #3 ->
FRAME A SHADOW ANSWERTo frame a shadow answer, we need to know what the correct answer should do. In this question, the correct answer must cast doubt on the experts' conclusion.
SHADOW ANSWER: Any situation that, after having taken the premise into consideration, leads us to believe that the private security firms did not pose the biggest risk to successful government espionage.
STEP #4 ->
ELIMINATE INCORRECT OPTIONS(A) Shortly before the government experts reached their conclusions, two private security companies each claimed to have developed "the world's strongest email encryption algorithm". |
NOT A MATCH |
What two private security companies claimed before (or after) the government experts reached their conclusions is irrelevant to understanding whether or not the private security firms posed the biggest risk to successful government espionage. If the claim of these companies was true, it might actually strengthen the argument; this option, however, does not indicate if the claim was true or false. |
ELIMINATE (B) The private security firms' decision to advertise their products and sell them publicly led to other members of the private sector and academia scrutinizing the encryption algorithms. |
NOT A MATCH |
What the private security firms' decision to advertise their products and sell them publicly caused other members of the private sector and academia to do does not tell us if the private security firms did not pose the biggest risk to successful government espionage. |
ELIMINATE (C) An open-source encryption algorithm, developed by an academic and freely available from popular websites, is recognized by numerous ex-government code breakers as the most unbreakable algorithm ever developed. |
MATCHES THE SHADOW ANSWER |
If an open-source encryption algorithm that was developed by an academic and freely available from popular websites is actually recognized by numerous ex-government code breakers as the most unbreakable algorithm ever developed, it leads us to believe that the private security firms did not actually pose the biggest risk to successful government espionage. Notice that the premise says the private security firms began publicly releasing and advertising encryption algorithms and other security products; this option, nonetheless, says that there is an open-source encryption algorithm actually developed by an academic and freely available from popular websites. This leads us to believe that the websites also posed a threat akin to the threat posed by the security firms. The premise is challenged, and the argument is weakened. Also, remember that we are looking for an answer option that leads us to believe that the private security firms did not pose the biggest risk to successful government espionage after having taken the premise into consideration.|
KEEP(D) An enemy government recently succeeded in placing a spy within the government espionage operations referred to above. |
NOT A MATCH |
If an enemy government recently succeeded in placing a spy within the government espionage operations mentioned, would that mean the private security firms did not pose the biggest risk to successful government espionage? Of course not! Notice that this option speaks of a recent action; also, it does not tell us how much of a threat is posed by the placed spy. |
ELIMINATE (E) To strengthen the reputation of the private security firms, employees of these firms publish information about the strength of their products and the benefits of using them. |
NOT A MATCH |
What the employees of the private security firms do to strengthen the firms' reputation does not give us any reason to believe that the firms did not or do not pose the biggest risk to successful government espionage. |
ELIMINATE Therefore, (C) has to be the correct answer.