Rated A
The hash value in bits for MD5 is ____. A security analyst on a local network using
A. 128 monitoring tools is likely to only be able to read
B. 160 contents of traffic encrypted using IPSec ______
C. 256 - ANSWER -128 mode.
A. Tunnel
B. Transport
Hashing involves taking a _____ length input and C. Trusted - ANSWER -Tunnel
producing a _____ length output (message
digest). Remember, with tunnel mode, encryption does
A. fixed; fixed not happen until just before it leaves the local
B. variable; fixed network. Traffic likely remains unencrypted
C. fixed; variable - ANSWER -variable; between the end user device and the local
fixed network boundary.
The hash value in bits for SHA-1 is ____. _____ is a lightweight cryptography method for
A. 128 signing messages (MAC). It boasts a relatively
B. 160 undemanding hardware implementation (only
C. 256 - ANSWER -160 ~3,333 gates required at 1MHz clock rate)
making it suitable for IoT implementation. -
ANSWER -Chaskey
The hash value in bits for MD4 is ____.
A. 128
B. 160 Chaskey has a key size of _____ bits.
C. 256 - ANSWER -128 A. 256
B. 128
C. 80 - ANSWER -128
IPSec ______ mode involves "end-to-end"
encryption; i.e. data remains encrypted from the
time it leaves a sender's device to the time it A weakness of one-way hashing is that the same
arrives at the receiver's device. piece of plaintext will result in the same ciphertext
A. Tunnel unless _____ is applied.
B. Transport A. Salt
C. Trusted - ANSWER -Transport B. Ash
C. Ether - ANSWER -salt
IPSec ______ mode involves encryption from
gateway to gateway, i.e. just through the public The minimum recommended key size to use with
network space. RC4 is _____ bits.
A. Tunnel A. 40
B. Transport B. 20
C. Trusted - ANSWER -Tunnel C. 64 - ANSWER -40
, C839v5/D334 Additional Practice Questions and Answers
Rated A
RC4 is a symmetric stream cipher with a variable C. 32, 64, 80 - ANSWER -128, 192, 256
key size up to a max of _____ bits.
A. 256
B. 2048 The Advanced Encryption Standard (AES)
C. 1024 - ANSWER -2048 operates using _____ bit blocks.
A. 128
B. 192
_____ has a block size of 64 bits, key size of 56 C. 256 - ANSWER -128
bits, and 16 rounds of substitution &
transposition.
A. DES Skipjack is a symmetric block cipher that uses a
B. AES ______ bit key.
C. RC4 - ANSWER -Data Encryption A. 64
Standard (DES) B. 80
C. 112 - ANSWER -80
A(n) _____ is a collection of precomputed hash
values of actual plaintext passwords used for Enocoro operates with a key size of ______ bits
password cracking. and an initialization vector (IV) of _____ bits.
A. initialization vector A. 80; 80
B. key pair B. 128; 64
C. rainbow table - ANSWER -rainbow table C. 80; 64 - ANSWER -128-bit key size; 64-
bit IV
_____ is a common x.509 certificate file type that
is used with both PEM and DER formats. Skipjack has a block size of _____bits.
A. .crt A. 64
B. .cer B. 80
C. .der - ANSWER -.cer C. 128 - ANSWER -64
_____ has a block size of 64 bits, key size of 112 PHOTON, SPONGENT, Lesamnta-LW, and
bits, and 48 rounds of substitution & Quark are examples of light-weight _____.
transposition. A. hashing algorithms
A. DES B. public-key algorithms
B. RSA C. symmetric block ciphers - ANSWER -
C. 3DES - ANSWER -Triple Data Light-weight hashing algorithms
Encryption Standard (3DES)
_____ has a block size of 64 bits, key size of 128
Key sizes used with the Advanced Encryption bits, and >17 rounds of substitution &
Standard (AES) include _____. _____, or _____. transposition.
A. 10, 12, 14 A. RSA
B. 128, 192, 256 B. DSA