Winter Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

Full Access
Question # 5

Which of the following acts as a verifier for the certificate authority?

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Full Access
Question # 6

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Full Access
Question # 7

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Full Access
Question # 8

Electromechanical rotor-based cipher used in World War II

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Full Access
Question # 9

Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.

A.

CFB

B.

GOST

C.

ECB

D.

RC4

Full Access
Question # 10

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Full Access
Question # 11

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Full Access
Question # 12

How can rainbow tables be defeated?

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

Full Access
Question # 13

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

A.

CBC-MAC

B.

CRC-MAC

C.

CRC-32

D.

CBC-32

Full Access
Question # 14

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

Full Access
Question # 15

Which of the following uses an 80 bit key on 64 bit blocks?

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

Full Access
Question # 16

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

Full Access
Question # 17

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Full Access
Question # 18

Which one of the following terms describes two numbers that have no common factors?

A.

Coprime

B.

Fermat's number

C.

Euler's totient

D.

Convergent

Full Access
Question # 19

Which of the following techniques is used (other than brute force) to attempt to derive a key?

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Full Access
Question # 20

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

Full Access
Question # 21

Which algorithm implements an unbalanced Feistel cipher?

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Full Access
Question # 22

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Full Access
Question # 23

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Full Access
Question # 24

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Full Access
Question # 25

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Full Access
Question # 26

Which one of the following attempts to hide data in plain view?

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

Full Access
Question # 27

What is a "Collision attack" in cryptography?

A.

Collision attacks try to break the hash into three parts to get the plaintext value

B.

Collision attacks try to get the public key

C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.

Collision attacks try to find two inputs producing the same

Full Access
Question # 28

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

A.

Steganography

B.

Cryptosystem

C.

Avalanche effect

D.

Key Schedule

Full Access
Question # 29

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Full Access