100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839v5- D334 Additional Practice INTRODUCTION TO CRYPTOGRAPHY

Rating
-
Sold
2
Pages
28
Uploaded on
06-02-2024
Written in
2023/2024

WGU C839v5- D334 Additional Practice INTRODUCTION TO CRYPTOGRAPHY











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 6, 2024
Number of pages
28
Written in
2023/2024
Type
Exam (elaborations)
Contains
Unknown

Subjects

  • d334

Content preview

WGU C839v5 - D334 Additional Practice INTRODUCTION TO CRYPTOGRAPHY 128 - The hash value in bits for MD5 is ____. A. 128 B. 160 C. 256 variable; fixed - Hashing involves taking a _____ leng th input and producing a _____ length output (message digest). A. fixed; fixed B. variable; fixed C. fixed; variable 160 - The hash value in bits for SHA -1 is ____. A. 128 B. 160 C. 256 128 - The hash value in bits for MD4 is ____. A. 128 B. 160 C. 256 Transport - IPSec ______ mode involves "end -to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device. A. Tunnel B. Transport C. Trusted Tunnel - IPSec ______ mode involves en cryption from gateway to gateway, i.e. just through the public network space. A. Tunnel B. Transport C. Trusted Tunnel Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypt ed between the end user device and the local network boundary. - A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode. A. Tunnel B. Transport C. Trusted Chaske y - _____ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation. 128 - Chaskey has a key size o f _____ bits. A. 256 B. 128 C. 80 salt - A weakness of one -way hashing is that the same piece of plaintext will result in the same ciphertext unless _____ is applied. A. Salt B. Ash C. Ether 40 - The minimum recommended key size to use with RC4 is _____ bits. A. 40 B. 20 C. 64 2048 - RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits. A. 256 B. 2048 C. 1024 Data Encryption Standard (DES) - _____ has a block s ize of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartzone Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3214
Member since
6 year
Number of followers
2291
Documents
14496
Last sold
4 hours ago
AMAIZING EDUCATION WORLD

GET ALL KIND OF EXAMS ON THIS PAGE ,COMPLETE TEST BANKS,SUMMARIES,STUDY GUIDES,PROJECT PAPERS,ASSIGNMENTS,CASE STUDIES, YOU CAN ALSO COMMUNICATE WITH THE SELLER FOR ANY PRE-ORDER,ORDER AND ETC.

3.7

586 reviews

5
260
4
94
3
103
2
30
1
99

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions