With Correct Answers-2026
The ___ block cipher mode facilitates parallel processing of data blocks.
A. DES
B. AES
C. CTR - CORRECT ANSWERS- Counter Mode (CTR)
_____ cryptography is better suited for real-time communications
implementations than ______ cryptography due to its relative faster speed.
A. Symmetric, Asymmetric
B. Asymmetric, Symmetric
C. Asymmetric, Public key - CORRECT ANSWERS- Symmetric,
Asymmetric
With NTLM, each of the characters in a password are converted into _____.
A. MD4
B. Unicode
C. Salt - CORRECT ANSWERS- Unicode
IPSec tunnel mode involves using _____ for routing.
A. the original IP header
B. a new IP header
C. OSPF - CORRECT ANSWERS- a new IP header
IPSec transport mode involves using _____ for routing.
A. the original IP header
B. a new IP header
C. OSPF - CORRECT ANSWERS- the original IP header
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256 - CORRECT ANSWERS- 128
,Hashing involves taking a _____ length input and producing a _____ length
output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - CORRECT ANSWERS- variable; fixed
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256 - CORRECT ANSWERS- 160
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256 - CORRECT ANSWERS- 128
IPSec ______ mode involves "end-to-end" encryption; i.e. data remains
encrypted from the time it leaves a sender's device to the time it arrives at
the receiver's device.
A. Tunnel
B. Transport
C. Trusted - CORRECT ANSWERS- Transport
IPSec ______ mode involves encryption from gateway to gateway, i.e. just
through the public network space.
A. Tunnel
B. Transport
C. Trusted - CORRECT ANSWERS- Tunnel
A security analyst on a local network using monitoring tools is likely to only
be able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted - CORRECT ANSWERS- Tunnel
, Remember, with tunnel mode, encryption does not happen until just before
it leaves the local network. Traffic likely remains unencrypted between the
end user device and the local network boundary.
_____ is a lightweight cryptography method for signing messages (MAC). It
boasts a relatively undemanding hardware implementation (only ~3,333
gates required at 1MHz clock rate) making it suitable for IoT
implementation. - CORRECT ANSWERS- Chaskey
Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80 - CORRECT ANSWERS- 128
A weakness of one-way hashing is that the same piece of plaintext will result
in the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether - CORRECT ANSWERS- salt
The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64 - CORRECT ANSWERS- 40
RC4 is a symmetric stream cipher with a variable key size up to a max of
_____ bits.
A. 256
B. 2048
C. 1024 - CORRECT ANSWERS- 2048
_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of
substitution & transposition.
A. DES
B. AES
C. RC4 - CORRECT ANSWERS- Data Encryption Standard (DES)