Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers)
a. TKIP
b. AES
c. ECC
d. RSA
Answer:
a....
You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
a. Hashing...
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?
You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than...
Which of the following are asymmetric encryption algorithms? (Select the three best answers)
Which of the following are asymmetric encryption algorithms? (Select the three best answers)
a. RC4
b. DES
c. AES
d. ECC
e. Diffie-Hellman
f. RSA
g....
Which of the following are symmetric encryption algorithms? (Select the four best answers)
Which of the following are symmetric encryption algorithms? (Select the four best answers)
a. RC4
b. DES
c. AES
d. ECC
e. Diffie-Hellman
f. RSA
g....
Which of the following is the weakest encryption type?
Which of the following is the weakest encryption type?
a. DES
b. AES
c. RSA
d. SHA
Answer: a. D...
A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
a. Recipient's...
A user sends an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to send the message?
A user sends an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to send the message?
a. Recipient's...
A user sends an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to receive the message?
A user sends an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to receive the message?
a. Recipient's...
A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
a. Recipient's...
Which type of encryption technology is used with the bitlocker application?
Which type of encryption technology is used with the bitlocker application?
a. Hashing
b. Asymmetric
c. WPA2
d. Symmetric
Answer: d. Symmet...
Which of the following technologies uses a PSK (Preshared Key)?
Which of the following technologies uses a PSK (Preshared Key)?
a. CRL
b. PGP
c. TPM
d. DES
Answer: b. P...
Which of the following encryption methods deals with two distinct large prime numbers and the inability to factor those prime numbers?
Which of the following encryption methods deals with two distinct large prime numbers and the inability to factor those prime numbers?
a. RSA
b. Symmetric
c....
Which of following algorithms is used by the protocol TLS to establish a session key?
Which of following algorithms is used by the protocol TLS to establish a session key?
a. RSA
b. HTTPS
c. RC4
d. AES
Answer: a. R...
How many bit keys are common in 3DES?
How many bit keys are common in 3DES?
a. 56
b. 160
c. 256
d. 168
Answer: d. 1...
How many bit keys are common in AES-256?
How many bit keys are common in AES-256?
a. 56
b. 160
c. 256
d. 128
Answer: c. 2...
How many bit keys are common in AES?
How many bit keys are common in AES?
a. 56
b. 160
c. 1024
d. 128
Answer: d. 1...
How many bit keys are common in DES?
How many bit keys are common in DES?
a. 56
b. 160
c. 1024
d. 128
Answer: a. ...
How many bit keys are common in Asymmetric encryption?
How many bit keys are common in Asymmetric encryption?
a. 64
b. 160
c. 1024
d. 128
Answer: c. 10...
MD5 algorithm will have how many bits?
MD5 algorithm will have how many bits?
a. 64
b. 160
c. 1024
d. 128
Answer: d. 1...
SHA1 algorithm will have how many bits?
SHA1 algorithm will have how many bits?
a. 64
b. 160
c. 1024
d. 128
Answer: b. 1...
SHA2 algorithm will have how many bits?
SHA2 algorithm will have how many bits?
a. 64
b. 512
c. 256
d. 128
b. 512
Answer: c. 2...
Which Algorithm has Typical Key Size of 128/192/256-Bit?
Which Algorithm has Typical Key Size of 128/192/256-Bit?
a. RC5
b. RC6
c. Twofish
Answer: c. Twofi...
Which Algorithm has Typical Key Size of 256-Bit?
Which Algorithm has Typical Key Size of 256-Bit?
a. RC5
b. RC6
c. Twofish
Answer: b. R...
Which Algorithm has Typical Key Size of 64-Bit?
Which Algorithm has Typical Key Size of 64-Bit?
a. RC5
b. RC6
c. Twofish
Answer: a. R...
Which Algorithm has Typical Key Size of 128-Bit?
Which Algorithm has Typical Key Size of 128-Bit?
a. DES
b. 3DES
c. AES
d. RC4
Answer: d. R...
Which Algorithm has Maximum Key Size of 256-Bit?
Which Algorithm has Maximum Key Size of 256-Bit?
a. DES
b. 3DES
c. AES
d. RC4
Answer: c. A...
Which Algorithm has Maximum Key Size of 168-Bit?
Which Algorithm has Maximum Key Size of 168-Bit?
a. DES
b. 3DES
c. AES
d. RC4
Answer: b. 3D...
Which Algorithm has Maximum key Size of 56-Bit?
Which Algorithm has Maximum key Size of 56-Bit?
a. DES
b. 3DES
c. AES
d. RC4
Answer: a. D...
SHA-2 has many sizes (224, 256, 334, 512 bit) and is the most widely used.
SHA-2 has many sizes (224, 256, 334, 512 bit) and is the most widely used.
a. True
b. Flase
Answer: a. Tr...
An organization that is responsible for issuing, revoking, and distributing certificates is know as Certificate Authority (CA).
An organization that is responsible for issuing, revoking, and distributing certificates is know as Certificate Authority (CA).
a. True
b. False
Answer: a....
What version of X.509 our used for CRL certificates?
What version of X.509 our used for CRL certificates?
a. X.509 v2
b. X.509 v3
Answer: a. X.509 ...
What version of X.509 our used for End Entity and CA certificates?
What version of X.509 our used for End Entity and CA certificates?
a. X.509 v2
b. X.509 v3
Answer: b. X.509 ...
What is the working group formed by the IETF to develop standards and models for the PKI environment?
What is the working group formed by the IETF to develop standards and models for the PKI environment?
a. Public-Key infrastructure X.509 (PKIX)
b....
What algorithm was designed to ensure the integrity of a message and is a one-way hash that provides a has value that can be used with an encryption protocol. This algorithm produces a 160-bit hash value.
What algorithm was designed to ensure the integrity of a message and is a one-way hash that provides a has value that can be used with an encryption...
What is/are the characteristics of the hash function?
What is/are the characteristics of the hash function?
a. It must be one-way
b. Variable-length input produces fixed length output
c. The algorithm...
When adding an ephemeral key to Elliptic Curve Diffie-Hellman is know as?
When adding an ephemeral key to Elliptic Curve Diffie-Hellman is know as?
a. Hashing
b. DHE
c. ECDHE
Answer: c. ECD...
When adding an ephemeral key to Diffie-Hellman is known as?
When adding an ephemeral key to Diffie-Hellman is known as?
a. DHE
b. ECDHE
c. Hashing
Answer: a. D...
Which algorithm uses an ephemeral key. Essentially the algorithm creates a key to use for the single communication session and it is not used again.
Which algorithm uses an ephemeral key. Essentially the algorithm creates a key to use for the single communication session and it is not used again.
a....
Which algorithm is similar functionality to RSA but uses smaller key sizes to obtain the same level of security, It uses points on a curve combined with a point at infinity and the difficulty of solving discrete logarithm problems.
Which algorithm is similar functionality to RSA but uses smaller key sizes to obtain the same level of security, It uses points on a curve combined...
What algorithm is used for exchanging keys over an insecure medium. Used primarily to send keys across public networks. The process isn't used to encrypt or decrypt messages but merely used for the creation of a symmetric key between two parties.
What algorithm is used for exchanging keys over an insecure medium. Used primarily to send keys across public networks. The process isn't used to encrypt...
What algorithm is an early public-key encryption system that uses large integers as the basis for the process. It works with both encryption and digital signatures.
What algorithm is an early public-key encryption system that uses large integers as the basis for the process. It works with both encryption and digital...
Public key and Private key together are referred to as Public Key Cryptography (PKC).
Public key and Private key together are referred to as Public Key Cryptography (PKC).
a. True
b. False
Answer: a. Tr...
The sender uses the _______ key to encrypt a message and the receiver uses the ______ key to decrypt the message.
The sender uses the _______ key to encrypt a message and the receiver uses the ______ key to decrypt the message.
a. Private and Public
b. Public and...
What are the Asymmetric keys referred ?
What are the Asymmetric keys referred ?
a. Public key and Private key
b. PKI and PII
c. TCP and SSL
Answer: a. Public key and Private k...
Asymmetric Algorithms uses how many keys to encrypt and decrypt?
Asymmetric Algorithms uses how many keys to encrypt and decrypt?
a. 2
b. 4
c. 6
d. 8
Answer: a....
Which secrecy occurs when the process is unbreakable?
Which secrecy occurs when the process is unbreakable?
a. Perfect forward secrecy
b. Forward secrecy
Answer: a. Perfect forward secre...
Which property of any key exchange system ensures that if one key is compromised a subsequent keys will not also be compromised?
Which property of any key exchange system ensures that if one key is compromised a subsequent keys will not also be compromised?
a. Perfect forward...
Which key exchange means that some other channel, other than the one that is going to be secured, is used to exchange the key?
Which key exchange means that some other channel, other than the one that is going to be secured, is used to exchange the key?
a. In-band
b. Out-of-band
Answer: b....
IPSec use which type of key exchange?
IPSec use which type of key exchange?
a. In-band
b. Out-of-band
Answer: a. In-ba...
Which key exchange is exchanged within the same communications channel that going to be encrypted?
Which key exchange is exchanged within the same communications channel that going to be encrypted?
a. In-band
b. Out-of-band
Answer: a. In-...
Which algorithm uses a key that is as long as a plaintext message and the keys are used only once.
Which algorithm uses a key that is as long as a plaintext message and the keys are used only once.
a. IDEA
b. Blowfish
c. One-Time Pads
d. Twofish
Answer: c....
What algorithm is known as a truly completely secure cryptographic implantation?
What algorithm is known as a truly completely secure cryptographic implantation?
a. IDEA
b. Blowfish
c. One-Time Pads
d. Twofish
Answer: c....
Which algorithm use 128-bit key and is similar in speed and capability to DES but is more secure. It is used in Pretty Good Privacy (PGP) a public domain encryption system.
Which algorithm use 128-bit key and is similar in speed and capability to DES but is more secure. It is used in Pretty Good Privacy (PGP) a public domain...
Which encryption system is similar to Blowfish and work on 128-bit blocks and it has a complex key schedule?
Which encryption system is similar to Blowfish and work on 128-bit blocks and it has a complex key schedule?
a. IDEA
b. Blowfish
c. One-Time Pads
d....
Which encryption system performs a 64-bit block cipher at very fast speeds. It is a symmetric block cipher that can use variable-length keys (32 bits - 448 bits)
Which encryption system performs a 64-bit block cipher at very fast speeds. It is a symmetric block cipher that can use variable-length keys (32 bits...
Which Rivest Cipher is used with SSL and TLS?
Which Rivest Cipher is used with SSL and TLS?
a. RC1
b. RC3
c. RC3
d. RC4
Answer: d. R...
Which Rivest Cipher is popular with wireless and WEP/WPA encryption and its steaming cipher that work with key sizes between 40 and 2048 bits.
Which Rivest Cipher is popular with wireless and WEP/WPA encryption and its steaming cipher that work with key sizes between 40 and 2048 bits.
a. RC2
b....
Which Rivest Cipher uses a key size up to 2048 bits and is considered to be a strong system?
Which Rivest Cipher uses a key size up to 2048 bits and is considered to be a strong system?
a. RC2
b. RC3
c. RC4
d. RC5
Answer: d. R...
What are the current levels of Rivest Cipher ?
What are the current levels of Rivest Cipher ?
a. RC1, RC2, RC3,
b. RC4, RC5, RC6
c. RC7, RC8, RC9
Answer: b. RC4, RC5, R...
Which algorithm is used in some products offered by Microsoft and IBM. It uses a 40-bit to 128 bit-bit key, and it's very fast and efficient.
Which algorithm is used in some products offered by Microsoft and IBM. It uses a 40-bit to 128 bit-bit key, and it's very fast and efficient.
a. AES256
b....
AES-256 uses 256 bits instead of 128. This qualifies for U.S. government classification as Top Secret.
AES-256 uses 256 bits instead of 128. This qualifies for U.S. government classification as Top Secret.
a. True
b. Flase
Answer: a. Tr...
Which encryption standard use the Rijndael algorithm and supports key sizes of 128, 192, and 256 bits, with 128 bits being the default.
Which encryption standard use the Rijndael algorithm and supports key sizes of 128, 192, and 256 bits, with 128 bits being the default.
a. AES (Advanced...
Which encryption standard is based on 168-bit key and is more secure than DES?
Which encryption standard is based on 168-bit key and is more secure than DES?
a. AES (Advanced Encryption Standard)
b. BES (Bit Encryption Standard)
c....
Which encryption standard is based on 56-bit key and was replace by Advance Encryption Standard?
Which encryption standard is based on 56-bit key and was replace by Advance Encryption Standard?
a. DES (Data Encryption Standard)
b. BES (Bit Encryption...
Which cipher encrypts one bit or byte at a time?
Which cipher encrypts one bit or byte at a time?
a. Stream cipher
b. Block cipher
Answer: a. Stream ciph...
Which cipher works on chunks of data-encrypting one and then moving to the next?
Which cipher works on chunks of data-encrypting one and then moving to the next?
a. Stream cipher
b. Block cipher
Answer: b. Block ciph...
Symmetric methods use either a block or stream cipher.
Symmetric methods use either a block or stream cipher.
a. True
b. False
Answer: a. Tr...
A symmetric key (secret key or private key) is a key that isn't disclosed to people who aren't authorized to use the encryption system.
A symmetric key (secret key or private key) is a key that isn't disclosed to people who aren't authorized to use the encryption system.
a. True
b....
Which algorithm require both ends of an encrypted message to have the same key and processing algorithms?
Which algorithm require both ends of an encrypted message to have the same key and processing algorithms?
a. Symmetric Cryptography
b. Asymmertic Cryptography
c....
What are the three areas modern cryptography is divided into?
What are the three areas modern cryptography is divided into?
a. Symmetric Cryptography
b. Asymmertic Cryptography
c. Bsymmertic Cryptography
d. Hashing...
What is the most common way of Steganography?
What is the most common way of Steganography?
a. Multi-Alphabet Substitution
b. Transportation Ciphers
c. Substitution Ciphers
d. Least significant...
What is the process of hiding a message in a medium such as a digital image, audio file, or other file?
What is the process of hiding a message in a medium such as a digital image, audio file, or other file?
a. Multi-Alphabet Substitution
b. Transportation...
The enigma machine was essentially a typewriter that implemented a multi-alphabet substitution cipher?
The enigma machine was essentially a typewriter that implemented a multi-alphabet substitution cipher?
a. True
b. False
Answer: a. Tr...
Which cipher involves transporting or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled.
Which cipher involves transporting or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each...
Which type of coding or ciphering system shifts all letters a certain number of spaces in the alphabet?
Which type of coding or ciphering system shifts all letters a certain number of spaces in the alphabet?
a. Multi-Alphabet Substitution
b. Transportation...
Which type of coding or ciphering system was famous for use of the Multi-Alphabet Substitution?
Which type of coding or ciphering system was famous for use of the Multi-Alphabet Substitution?
a. Vigenère Cipher
b. Caesar Cipher
c. Enigma Machine
d....
One of the problems with substitution ciphers is that they did not change the underlying letter and word frequency of the text.
One of the problems with substitution ciphers is that they did not change the underlying letter and word frequency of the text.
a. True
b. False
Answer: a....
Which type of coding or ciphering system used many substitutions?
Which type of coding or ciphering system used many substitutions?
a. Multi-Alphabet Substitution
b. Transportation Ciphers
c. Substitution Ciphers
d....
Which type of coding or ciphering system changes one character or symbol into another?
Which type of coding or ciphering system changes one character or symbol into another?
a. Multi-Alphabet Substitution
b. Transportation Ciphers
c....
Which asymmetric algorithm algorithm involves four steps: key generation, key distribution, encryption and decryption.
Which asymmetric algorithm algorithm involves four steps: key generation, key distribution, encryption and decryption.
a. RSA
b. AES
c. 3DES
d. SHA
Answer: a....
Pretty Good Privacy is an excellent e-mail encryption tool that is either free or low cost.
Pretty Good Privacy is an excellent e-mail encryption tool that is either free or low cost.
a. True
b. False
Answer: a. Tr...
Which of the following would be the best choice for e-mail encryption?
Which of the following would be the best choice for e-mail encryption?
a. MID5
b. IPSEC
c. TLS
d. PGP
Answer: d. P...
Message Authentication Code (MAC) is derived from what to elements?
Message Authentication Code (MAC) is derived from what to elements?
a. Message and Key
b. Username and Password
c. NAT and NIC
d. Host and Labels
Answer: a....
Which process allows all users and interested parties to comment on proposed standards for the internet. The editor manages the process and is responsible for cataloging, updating, and tracking?
Which process allows all users and interested parties to comment on proposed standards for the internet. The editor manages the process and is responsible...
Hashing algorithms must be one-way/non reversible, have variable-length input and fixed-length output, and be collision resistant.
Hashing algorithms must be one-way/non reversible, have variable-length input and fixed-length output, and be collision resistant.
a. True
b. Fals...
Which of the following is similar to Blowfish but works on 128-bit blocks?
Which of the following is similar to Blowfish but works on 128-bit blocks?
a. Twofish
b. IDEA
c. CCITT
d. AES
Answer: a. Twofi...
Which set of specification is designed to allow XML-based programs access to PKI services?
Which set of specification is designed to allow XML-based programs access to PKI services?
a. XKMS
b. XMLS
c. PKXMS
d. PKIXMLS
Answer: a. X...
Which protocol allows a certificate's authenticity to be immediately verified?
Which protocol allows a certificate's authenticity to be immediately verified?
a. CA
b. CP
c. CRC
d. OCSP
Answer: d. OC...
What is the process of storing keys for use by law enforcement called?
What is the process of storing keys for use by law enforcement called?
a. Key escrow
b. Key archival
Key renewal
Certificate rollover
Answer: a....
What document describes how a CA issues certificates and for what they are used?
What document describes how a CA issues certificates and for what they are used?
a. Certificate policies
b. Certificate practices
c. Revocation authority
d....
You've been instructed to suspend a key. Which of the following statements is true?
You've been instructed to suspend a key. Which of the following statements is true?
a. In order to be used, suspended keys must be revoked.
b. Suspended...
Which organization can be used to identify and individual for certificate issues in a PKI environment?
Which organization can be used to identify and individual for certificate issues in a PKI environment?
a. RA
b. LRA
c. PKE
d. SHA
Answer: b....
What is often used to revoke a certificate?
What is often used to revoke a certificate?
a. CRA
b. CYA
c. CRL
d. PKI
Answer: c. C...
What is the primary organization for maintaining certificates called?
What is the primary organization for maintaining certificates called?
a. CA
b. RA
c. LRA
d. CRL
Answer: a. ...
Which of the following is not a consideration in key storage?
Which of the following is not a consideration in key storage?
a. Environmental controls
b. Physical security controls
c. Hardened servers
d. Administrative...
You need to encrypt your hard drive. Which of the following is the best choice?
You need to encrypt your hard drive. Which of the following is the best choice?
a. DES
b. RSA
c. AES
d. SHA
Answer: c. A...
What problem is created by using a centralized key-generating process?
What problem is created by using a centralized key-generating process?
a. Network security
b. Key transmission
c. Certificate revocation
d. Private...
MAC is an acronym for what as it relates to cryptography?
MAC is an acronym for what as it relates to cryptography?
a. Media access control
b. Mandatory access control
c. Message authentication code
d. Multiple...
Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
a. TLS
b. SSH
c. RSH
d. X.509
Answer: a....
Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?
Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however,...
The process of proposing a new standard or method on the Internet is referred to by which acronym?
The process of proposing a new standard or method on the Internet is referred to by which acronym?
a. WBS
b. X.509
c. RFC
d. IEEE
Answer: c....
Which of the following is the most widely used asymmetric algorithm today?
Which of the following is the most widely used asymmetric algorithm today?
a. RSA
b. AES
c. 3DES
d. SHA
Answer: a. R...
Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?
Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose...
Which of the following does not apply to a hashing algorithm?
Which of the following does not apply to a hashing algorithm?
a. One-way
b. Long key size
c. Variable-length input with fixed-length output
d. Collision...
Subscribe to:
Posts (Atom)