Complete Questions and Guide Answers
100% Verified Graded A+
1. The hash value in bits for MD5 is .
A. 128
B. 160
C. 256
Answer: 128
2. Hashing involves taking a length input and producing a length
output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
Answer: variable; fixed
,3. The hash value in bits for SHA-1 is .
A. 128
B. 160
C. 256
Answer: 160
4. The hash value in bits for MD4 is .
A. 128
B. 160
C. 256
Answer: 128
5. IPSec mode involves "end-to-end" encryption; i.e. data remains en-
crypted from the time it leaves a sender's device to the time it arrives at the
receiver's device.
A. Tunnel
B. Transport
C. Trusted
Answer: Transport
,6. IPSec mode involves encryption from gateway to gateway, i.e. just
through the public network space.
A. Tunnel
B. Transport
C. Trusted
Answer: Tunnel
7. A security analyst on a local network using monitoring tools is likely to only be able
to read contents of traffic encrypted using IPSec mode.
A. Tunnel
B. Transport
C. Trusted
Answer: Tunnel
Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traflc likely remains unencrypted
between the end user device and the local network boundary.
8. is a lightweight cryptography method for signing messages (MAC). It
boasts a relatively undemanding hardware implementation (only ~3,333 gates required
, at 1MHz clock rate) making it suitable for IoT implementation.
Answer: Chaskey
9. Chaskey has a key size of bits.
A. 256
B. 128
C. 80
Answer: 128
10. A weakness of one-way hashing is that the same piece of plaintext will result in the
same ciphertext unless is applied.
A. Salt
B. Ash
C. Ether
Answer: salt
11. The minimum recommended key size to use with RC4 is bits.
A. 40
B. 20
C. 64