Which of the following encryption algorithms are supported by the IEEE 802.11i standard? (Select the two best answers)
a. TKIP
b. AES
c. ECC
d. RSA
Answer:
a. TKIP
b. AES
Learn More :
Cryptography
- You selected a cipher that will encrypt 128 bits at a time before sending the data across the network. Which of the following have you chosen?
- You are tasked with selecting an asymmetric encryption method that allows for the same level of encryption strength, but with a lesser key length than is typically necessary. Which encryption method fulfills your requirements?
- Which of the following are asymmetric encryption algorithms? (Select the three best answers)
- Which of the following are symmetric encryption algorithms? (Select the four best answers)
- Which of the following is the weakest encryption type?
- A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
- A user sends an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to send the message?
- A user sends an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to receive the message?
- A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
- Which type of encryption technology is used with the bitlocker application?
- Which of the following technologies uses a PSK (Preshared Key)?
- Which of the following encryption methods deals with two distinct large prime numbers and the inability to factor those prime numbers?
- Which of following algorithms is used by the protocol TLS to establish a session key?
- How many bit keys are common in 3DES?
- How many bit keys are common in AES-256?
- How many bit keys are common in AES?
- How many bit keys are common in DES?
- How many bit keys are common in Asymmetric encryption?
- MD5 algorithm will have how many bits?
- SHA1 algorithm will have how many bits?
- SHA2 algorithm will have how many bits?
- Which Algorithm has Typical Key Size of 128/192/256-Bit?
- Which Algorithm has Typical Key Size of 256-Bit?
- Which Algorithm has Typical Key Size of 64-Bit?