Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers) Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers) a. TKIP b. AES c. ECC d. RSA Answer: a. TKIP b. AES
You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen? You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen? a. Hashing algoritm b. Block cipher c. RC4 d. Stream cipher Answer: b. Block cipher
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements? You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements? a. Twofish b. ECC c. DHE d. RSA Answer: b. ECC
Which of the following are asymmetric encryption algorithms? (Select the three best answers) Which of the following are asymmetric encryption algorithms? (Select the three best answers) a. RC4 b. DES c. AES d. ECC e. Diffie-Hellman f. RSA g. 3DES Answer: d. ECC e. Diffie-Hellman f. RSA
Which of the following are symmetric encryption algorithms? (Select the four best answers) Which of the following are symmetric encryption algorithms? (Select the four best answers) a. RC4 b. DES c. AES d. ECC e. Diffie-Hellman f. RSA g. 3DES Answer: a. RC4 b. DES c. AES g. 3DES
Which of the following is the weakest encryption type? Which of the following is the weakest encryption type? a. DES b. AES c. RSA d. SHA Answer: a. DES
A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message? A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message? a. Recipient's private key b. Sender's private key c. Sender's public key d. Recipient's public key Answer: c. Sender's public key