OBJECTIVE ASSESSMENT EXAM 2025/2026
BANK 2 VERSIONS QUESTIONS AND
ACCURATE ACTUAL EXAM WITH
FREQUENTLY TESTED QUESTIONS AND
STUDY GUIDE / EXPERT VERIFIED FOR
GUARANTEED PASS/ALREADY GRADED A+
AES when operating with 12 rounds uses what key size?
A. 128 bits
B. 192 Bits
C 256 bits - ....ANSWER...192 bits
Which variation of Elliptic Curve cryptography is used to
support symmetric key exchange?
A. ECDSA
B. secp256k1
C. ECDH - ....ANSWER...ECDH
,The Paillier cryptosystem supports _____ encryption.
A. homomorphic
B. active
C. passive - ....ANSWER...homomorphic
PKCS #__ is a standard used for password-based encryption.
A. 1
B. 5
C. 7 - ....ANSWER...PKCS #5
AES can be susceptible to a copy-and-paste attack when used
with which block cipher mode?
A. ECB
B. OFB
C. RC4 - ....ANSWER...ECB
____ has proven to be free from major vulnerabilities, but
poor implementation of the encryption method leaves it
susceptible to attacks such as: Brute force, use of Non-
Random Numbers, copy-and-paste and timing attacks.
A. AES
,B. Ethereum
C. CTR - ....ANSWER...AES
______ measures the amount of unpredictability, and in
encryption it relates to the degree of uncertainty of the
encryption process.
A. Padding
B. Encoding
C. Entropy - ....ANSWER...Entropy
For secure communications using HTTPS, the _____ is used
to prove the identity of the server for which the Web browser
connects to.
A. digital certificate
B. digital signature
C. message digest - ....ANSWER...digital certificate
A digital certificate contains the _____ key of the entity the
certificate is issued to.
A. Public
B. Private
C Ephemeral - ....ANSWER...Public
, WPA supported Temporal Key Integrity Protocol (TKIP),
which used an initialization vector (IV) value of _____ bits.
A. 24
B. 48
C. 64 - ....ANSWER...48
LM Hash is used in many versions of Microsoft Windows
operating systems to store user passwords that are fewer than
_____ characters in length.
A. 7
B. 14
C 15 - ....ANSWER...15
With a group of 70 people in a room, there is a 99.9% chance
two of those people were born on the same day. This
probability theory is used as a brute force method in
cryptography called _______.
A. Rainbow table
B. Birthday attack
C. Phpass attack - ....ANSWER...Birthday Attack