2025 W G U D334 Additional Practice All Questions
and Correct Answers | Graded A+ | Verified Answers |
Just Released | Western Governors University
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256 - (ANSWER)128
Hashing involves taking a _____ length input and producing a _____ length output
(message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - (ANSWER)variable; fixed
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256 - (ANSWER)160
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256 - (ANSWER)128
,IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted
from the time it leaves a sender's device to the time it arrives at the receiver's
device.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Transport
IPSec ______ mode involves encryption from gateway to gateway, i.e. just
through the public network space.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Tunnel
A security analyst on a local network using monitoring tools is likely to only be
able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Tunnel
Remember, with tunnel mode, encryption does not happen until just before it
leaves the local network. Traffic likely remains unencrypted between the end user
device and the local network boundary.
,_____ is a lightweight cryptography method for signing messages (MAC). It boasts
a relatively undemanding hardware implementation (only ~3,333 gates required
at 1MHz clock rate) making it suitable for IoT implementation. -
(ANSWER)Chaskey
Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80 - (ANSWER)128
A weakness of one-way hashing is that the same piece of plaintext will result in
the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether - (ANSWER)salt
The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64 - (ANSWER)40
RC4 is a symmetric stream cipher with a variable key size up to a max of _____
bits.
, A. 256
B. 2048
C. 1024 - (ANSWER)2048
_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution
& transposition.
A. DES
B. AES
C. RC4 - (ANSWER)Data Encryption Standard (DES)
A(n) _____ is a collection of precomputed hash values of actual plaintext
passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table - (ANSWER)rainbow table
_____ is a common x.509 certificate file type that is used with both PEM and DER
formats.
A. .crt
B. .cer
C. .der - (ANSWER).cer
and Correct Answers | Graded A+ | Verified Answers |
Just Released | Western Governors University
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256 - (ANSWER)128
Hashing involves taking a _____ length input and producing a _____ length output
(message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - (ANSWER)variable; fixed
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256 - (ANSWER)160
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256 - (ANSWER)128
,IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted
from the time it leaves a sender's device to the time it arrives at the receiver's
device.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Transport
IPSec ______ mode involves encryption from gateway to gateway, i.e. just
through the public network space.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Tunnel
A security analyst on a local network using monitoring tools is likely to only be
able to read contents of traffic encrypted using IPSec ______ mode.
A. Tunnel
B. Transport
C. Trusted - (ANSWER)Tunnel
Remember, with tunnel mode, encryption does not happen until just before it
leaves the local network. Traffic likely remains unencrypted between the end user
device and the local network boundary.
,_____ is a lightweight cryptography method for signing messages (MAC). It boasts
a relatively undemanding hardware implementation (only ~3,333 gates required
at 1MHz clock rate) making it suitable for IoT implementation. -
(ANSWER)Chaskey
Chaskey has a key size of _____ bits.
A. 256
B. 128
C. 80 - (ANSWER)128
A weakness of one-way hashing is that the same piece of plaintext will result in
the same ciphertext unless _____ is applied.
A. Salt
B. Ash
C. Ether - (ANSWER)salt
The minimum recommended key size to use with RC4 is _____ bits.
A. 40
B. 20
C. 64 - (ANSWER)40
RC4 is a symmetric stream cipher with a variable key size up to a max of _____
bits.
, A. 256
B. 2048
C. 1024 - (ANSWER)2048
_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution
& transposition.
A. DES
B. AES
C. RC4 - (ANSWER)Data Encryption Standard (DES)
A(n) _____ is a collection of precomputed hash values of actual plaintext
passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table - (ANSWER)rainbow table
_____ is a common x.509 certificate file type that is used with both PEM and DER
formats.
A. .crt
B. .cer
C. .der - (ANSWER).cer